Secure and Private VoIP Communications
We believe our VoIP platform is the most secure available and we have studied all regional and National VoIP competitors.
|National VoIP Firms||Infotel Systems|
|LAN||One Ethernet cable. Computer plugs into Phone. All PC traffic runs through VoIP phone||We install separate voice cabling|
|SWITCH||Common switch for voice and data traffic||We install a separate voice switch|
|SECURITY VOICE ROUTER||No||Yes. We apply hardware encryption before the call leaves your premise|
|VoIP PATH||Open Internet using standard ports. (SIP TCP 5060). VoIP traffic goes through "carrier hotels" and across several ISPs||We use secure VPN tunnels to us.Your phone call signal NEVER leaves your ISP. We are co-located with Verizon and one mile from Comcast. We call this "close cloud" , we are simply close to you Richmond|
|PHONE PROVISIONING||Out of box, the made in China phone reports it's unique MAC address to China provisioning server. China knows who bought the phone and redirects request to National VoIP companies config servers in the US. This process is required process for National firms self install||Phones are programed in our office and installed by Infotel techs|
|CUSTOMER ISOLATION||Huge virtualized servers. Hack one server and you can access all customers||Separate physical blades for each customer|
|VOICE RECORDINGS||Stored on hosted servers. This was the data breach with Broadvoice||We offer on site "tap and store" of recordings. The data never leaves your premise.|
Here are just a few of the major data breaches in recent history
|Year||Company||Breach (Entry) Point||Damage|
|2014||Target Stores||HVAC vendor server||40 million credit cards numbers compromised|
|2019||Broadvoice||Voicemail server||200,000 voicemail transcripts, customer data, etc|
|2020||Solar Winds||Software Update server||Data breach of government servers including Department of Treasury and Commerce|
Old Phone Service Was Secure, Some VOIP Systems Are Not
Your old phone system used (POTS) Plain Old Telephone Service. It was the analog line standard for one hundred years since Alexander Graham Bell. Many considered “POTS” impervious to hacking. Yet, most VoIP phone systems use unsecured Internet connections connected to your data network. VoIP provider Vonage states on this web page “.. do not use VoIP … use analog telephone lines instead as they are just harder to tap and extract the data from”
The Risk of Unsecured Voice – PCI (credit card) Example
Your sales person takes a credit card number over your new Voice over Internet (VoIP) telephone system. The system does not feature VoIP audio encryption. Many systems fail this VoIP security requirement as PCI 3.0 was only ratified in November 2018. You are subject to these fines. https://www.google.com/search?q=pci+fines
Industry Standards Security Review
- HIPAA – requires voicemails, audio recordings and call reports to be protected. Unlike national providers, we can provide an onsite storage for the ultimate in compliance.
- PCI – Telephone system VoIP security rules. We encrypt all traffic. Handled!
- FIRNA – rule 4370 recommends business continuity systems such as 4G internet backup to a failed Comcast Internet. Rule 3170 covers voice recordings.
- NIST – standards for VoIP security to include separation of voice and data networks. A national VoIP company that self-install ships phones in a box does not comply.
- SOX – Reflects NIST standards for data network protection.