Broadview Networks Stresses Why Users are Best Protected with Cloud VoIP
Security has always been the top concern of businesses in regards to Voice over Internet Protocol (VoIP) and cloud technologies. Threats against cloud-based VoIP phone systems like vishing, Denial of Service (DoS), eavesdropping, and more are all potential security issues that businesses should be aware of. But businesses can implement a number of security steps in order to protect themselves against any problems. In this article, Jeff Blackey, Senior Vice President of Marketing at Broadview Networks, explains why users are best protected with a 100% cloud-based VoIP system and shares the steps Broadview is taking to ensure its users enjoy a reliable and secure cloud voice solution.
Cloud VoIP Vs Premise-Based Systems
Stories of data security breaches, especially in companies that seem to be impenetrable such as Yahoo, Dyn, and Sony, are sometimes just enough to scare away small businesses from making the transition to a cloud voice solution. Some believe that if these established companies can suffer from massive security threats, then small businesses with a cloud-based VoIP system can be at risk, too. But Broadview’s Jeff Blackey notes that these concerns can be put to rest because cloud and VoIP security threats can be avoided when the proper controls and procedures are in place.
According to Blackey, “When properly designed, deployed, and used, the cloud is a more secure option than any premise-based system that most IT organizations have in place today.” Blackey says that compared to on-premise solutions, users are best protected with a 100% cloud-based VoIP system. This is because data is not stored on the physical phone but encrypted in the cloud instead.
“On-premise solutions are installed locally, on a company’s own computers, phones, and servers, and are subject to local disasters, local thefts and local hacks in a typically insecure environment,” Blackey said. “Meanwhile, cloud-based systems are hosted on the vendor’s servers, accessible through an encrypted web browser leaving nothing on-site to be vulnerable to hacking, theft or even damage. By having your system hosted in the cloud, you get carrier-grade security out of the box,” he added.
Fundamentals of VoIP Security
For companies that already know and appreciate the value of cloud voice solutions, Blackey says there are steps organizations need to take to safeguard their information. First is implementing a robust internal security process. Blackey suggests “reviewing calling and administrative permissions carefully for each employee, limiting the ability to make updates to the system, possibly limiting international calls etc..”
Second is choosing the right cloud vendor for VoIP systems. Blackey says the most important qualification a company must look out for is whether the provider complies with all FCC requirement and regulations for protecting Consumer Proprietary Network Information. In addition, organizations must also check whether the vendor operates data centers that are SSAE-16 certified by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA) and are verified by independent third-party audit Type 2 and 3 reports as these confirm the quality, compliance, and security of the provider’s systems and services.
How Broadview Protects its Users
As one of the pioneers in cloud innovation, Broadview Networks is dedicated to providing secure and mobile communications to its customers. Their popular solution, OfficeSuite UC™, is the only 100% cloud-based unified communications solution on the market that offers unmatched security, mobility, and control. And because Broadview’s OfficeSuite UC™ is 100% hosted in the cloud, Blackey says that all company data (such as employee profiles and call logs) are stored in the cloud and kept safe with encryption.
“There is no longer anything stored physically on-site or on the phone itself that can fail, be tampered with or accessible to a hacker or competitor stealing data on-site – stealing customer contact info,” he explains. In addition, virtual meetings through OfficeSuite HD Meeting™ (Broadview’s cloud-based meeting service that unifies high-definition video, audio and web conferencing) can be protected with encryption as well.
Broadview also uses a number of encryption methods to make sure all the voice calls, messages, and recordings stored on their servers remain protected and confidential. These include Transport Layer Security (TLS), cryptographic protocols, and Advanced Encryption Standard (AES), a symmetric encryption algorithm. Encryption, however, is only one of the many layers of security measures that Broadview incorporates in their OfficeSuite UC that help organizations maintain their HIPAA and SSAE16 compliance requirements.
Final Thoughts
Security is indeed one of the most major and important of factors when choosing a voice communication solution for businesses. Companies must make sure that the system they choose utilizes unique and powerful technologies to keep their critical data secured. And the cloud just might offer the solution for that.
So for those torn between on-premise or cloud-based systems, Blackey poses the following question to businesses: “Is my money safer under my mattress or in the vault at an insured bank?”
About Broadview
Broadview Networks offers advanced cloud business communications systems and solutions designed to meet the demands of businesses in every size and industry. Trusted by more than 250,000 users nationwide, Broadview is consistently recognized for their innovation, support, and award-winning products. Their products include OfficeSuite UC™, a 100% cloud solution; OfficeSuite HD Meeting, their HD video, audio and web conferencing solution; OfficeSuite Cloud Computing; and Network Voice & Data services.