Essential Guide

Essential guide to business continuity and disaster recovery plans

A comprehensive collection of articles, videos and more, hand-picked by our editors
Q

Mitigating VoIP vulnerability

Independent disaster recovery expert Paul Kirvan outlines common VoIP vulnerabilities and offers advice on how to mitigate them in this Expert Answer.

What are some commonly overlooked vulnerabilities in VoIP systems?

The following table lists examples of frequent VoIP system vulnerabilities, with recommended actions to address them.

VoIP vulnerabilities and recommended mitigation

This was last published in September 2013

PRO+

Content

Find more PRO+ content and other member only offers, here.

Essential Guide

Essential guide to business continuity and disaster recovery plans

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSolidStateStorage

SearchConvergedInfrastructure

SearchCloudStorage

SearchDataBackup

SearchStorage

Close