Start Free

The VoIP Security Checklist: How to Protect Your VoIP Phone System

VoIP phones, like any device connected to the Internet, can be targeted by hackers involved in fraud, theft, and other crimes. Many of these hackers hail from sophisticated operations that intend to hijack business phones for illicit calls. In 2017, telecom fraud amounted to $29.2 billion in losses, with PBX and toll fraud at the top of the list. While it’s tempting to think this number, a 25% decrease from 2015, signals a decline in phone-centric fraud, it’s more indicative of consumers’ growing shrewdness around phone scams and cybersecurity.  

Read More

Topics: SMB Leadership, Business Technology, Office Management, NAT, VoIP Solutions, passwords, VoIP Phone System FAQs, time-sensitive content, voip fraud

What are NAT and Firewall Traversals?

NAT and firewalls determine how Internet traffic is routed to your computers, phones and other devices. These technologies facilitate peer-to-peer filesharing, VoIP calling, and other Internet-based communications. In this blog, we'll cover what NAT and firewalls are, and how they can impact your daily Internet activities.

Read More

Topics: NAT, VoIP Fundamentals, VoIP Glossary, firewall traversal