Q

Mitigating VoIP vulnerability

Independent disaster recovery expert Paul Kirvan outlines common VoIP vulnerabilities and offers advice on how to mitigate them in this Expert Answer.

What are some commonly overlooked vulnerabilities in VoIP systems?

The following table lists examples of frequent VoIP system vulnerabilities, with recommended actions to address them.

VoIP vulnerabilities and recommended mitigation

This was first published in September 2013

Dig deeper on Disaster Recovery Networking

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDataBackup

SearchStorage

Close