So with any application, a VoIP telephone system needs to be safe, and this article outlines some crucial things you can do to keep your telephone system secure:
1. Install your telephone system behind a firewallThe most fundamental step that you can carry out is to install your telephone system behind a firewall. Open no more than the ports that you need: If you use external extensions and bridges, you can go for to use the 3CX tunnel and just open a single port intended for the tunnel.
2. Ensure resilient extension passwords
Weak extension passwords are exceedingly risky. Do not use the extension number the same as the pin code or password. Ensure that you use tough, random passwords to prevent remote hackers registering with their soft phone to your PBX. As straightforward and obvious as this may perhaps sound, weak extension passwords are the number one source of security breaches.
3 Keep your windows up to date
Windows can without human intervention download vital updates. This means your OS is protected against serious vulnerabilities. Out of the box, and up to date, a Windows Server System is pretty secure.
4 Check your call logs weekly, better on a daily basis
Check your call logs weekly or better day after day. This way you can quickly pick up on mishandling of the telephone system by either hackers or else indeed legitimate users of the telephone system. Use the inbuilt call reports to check calling trends.
5 Use an IP PBX that is security tested
Even if your Operating system is fully safe, and your firewall is accurately configured, you depend on how securely your telephone system has been coded. 3CX is built on .NET (which has many inbuilt security features) and it is methodically tested by outside security consultants.
6. Use a VPN.
If you require to add an extra layer of security, use a VPN. Avaya telephone Systems fully support the use of VPNs – use the free openVPN for Windows and secure bridges and external extensions with no trouble and cheaply.
7. Lock down which IPs otherwise networks can access the telephone system.
A further extra level of protection is to narrow down from which IPs you will allow registrations. This locks out the rest of the internet and provides a first-rate extra level of security. For example, if you have remote workers that always work from a individual location, you can consider purchasing dedicated IPs for these locations so that you can further limit access to the telephone system by IP. This configuration is done at firewall level.