Top Banner
25

How to protect your business telephony from cyber attacks - webinar 2017, English

Mar 21, 2017

Download

Technology

Askozia
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: How to protect your business telephony from cyber attacks - webinar 2017, English
Page 2: How to protect your business telephony from cyber attacks - webinar 2017, English

Your Hosts

Markus Ehlers Raiko Schulz

Page 3: How to protect your business telephony from cyber attacks - webinar 2017, English

Agenda

•Common mistakes

•Common forms of attack

•Counter measures

Page 4: How to protect your business telephony from cyber attacks - webinar 2017, English

•Unsafe passwords

•Missing firewall

•Public IP address

•Port forwarding instead of VPN

•Unencrypted telephony

•No strict call rights and limitations

•Access rights not limited

•Unused IP services and devices still being connected

•No backups

•Missing plan B

10 Common Mistakes

Page 5: How to protect your business telephony from cyber attacks - webinar 2017, English

Common Cyber Attacks Denial of ServiceEavesdropping

SPIT

Toll Fraud

Man-in-the- Middle Attack

Flooding

Infrastructure Hijacking

Infrastructure Highjacking

High Phone BillIdentity Highjacking

Brute Force Attack

ARP Poisining

Bot Net

IP-Spoofing

Page 6: How to protect your business telephony from cyber attacks - webinar 2017, English

•Much easier with VoIP

•No separate phone lines

•Aiming for log-in data and internal information

•Man-in-the-middle Attack

•ARP-Poisoning targeting Address Resolution Protocol

•Hijacking standard gateways and DHCP-Spoofing

• Infrastructure Hijacking

Common Cyber Attacks Eavesdropping

Page 7: How to protect your business telephony from cyber attacks - webinar 2017, English

•Port-scan followed by Brute-Force Attack

•Man-in-the-Middle Attack and Identity Spoofing

•Attacker faking identity to gain internal information or for fraud

•Expensive oversea calls, hotline and service numbers

Common Cyber Attacks Fraud

Page 8: How to protect your business telephony from cyber attacks - webinar 2017, English

•Spam-over-Internet

• IP PBX gets hijacked to act as a bot

•Forged RTP Packets

•Very difficult to back-trace and to oppose

• Identity Spoofing and Bot networks

•Content filter acts too late

•May only help in time for voicemail messages

Common Cyber Attacks SPIT

Page 9: How to protect your business telephony from cyber attacks - webinar 2017, English

• (D)DoS Attacks

•Aiming for malfunction of a system

• IP Spoofing to keep attacker hidden or to

•Overload victims with response packages

Common Cyber Attacks Denial-of-Service

Page 10: How to protect your business telephony from cyber attacks - webinar 2017, English

•Company guideline for network safety

•Regular review and update

•PBX and network security

•All network devices need to be secured!

Security Measures

Page 11: How to protect your business telephony from cyber attacks - webinar 2017, English

•Letters, digits, special characters

•At least 8 characters

•No words nor name

Security Measures Secure Password

adminpassword000012344321askoziaaizoksa

8C+inL6B}4_kQu3F6b?!1Q_ct!88_u7V.dLN1@i+yY{L97Km

Page 12: How to protect your business telephony from cyber attacks - webinar 2017, English

•Protection against DDoS and Brute Force attacks

•Blocking ports for the internet, intranet or LAN

•Packet filter

•Network Address Translation (NAT)

•Avoid port forwarding

Security Measures Network Firewall

Page 13: How to protect your business telephony from cyber attacks - webinar 2017, English

• IPtables, application-based

•Blocking ports for the internet, intranet or LAN

•Additional protection for your PBX

•Fail2Ban

Security Measures Askozia Firewall

Page 14: How to protect your business telephony from cyber attacks - webinar 2017, English

Security Measures Fail2Ban

•Featured by Askozia firewall

•Further protection against Brute Force attacks.

•Blocking IPs that repeatedly use incorrect log-in data

•Preventing attackers from guessing an internal number

•alwaysauthreject = yes.

•Responses are always the same for both correct and incorrect user data

Page 15: How to protect your business telephony from cyber attacks - webinar 2017, English

•Blocking or accepting certain numbers

•For example:

•Blocking certain numbers from calling through a provider

•Adding certain numbers as exceptions to Fail2Ban

Security Measures Blacklist / Whitelist

Page 16: How to protect your business telephony from cyber attacks - webinar 2017, English

• Instead of port forwarding!

•To prevent Bots, DDOS, Brute Force and Man-in-the-Middle attacks

•A poorly configured firewall is as good as no firewall

•Same subnet ensures better audio transmission

•Calls are encrypted

Security Measures VPN Tunnelling

Page 17: How to protect your business telephony from cyber attacks - webinar 2017, English

•NGN ports (New Generation networks)

•Virtual Local Networks (VLAN)

•Divides physical networks into logical subnets

•Within a switch or a network

•VLAN-capable switches keep data within the subnet

Security Measures Separate Telephony and Data

Page 18: How to protect your business telephony from cyber attacks - webinar 2017, English

•Man-in the-middle

•Receives requests and establishes connection

•No direct communication between two parties

•Costly

Security Measures SIP Proxy

Page 19: How to protect your business telephony from cyber attacks - webinar 2017, English

•Secure web server (HTTPS)

•Secure SIP (SIPS) and Secure RTP (SRTP)

•Protection against eavesdropping

•Certificates can be created or uploaded in AskoziaPBX

Security Measures Encryption

Page 20: How to protect your business telephony from cyber attacks - webinar 2017, English

•Restrictive dial patterns

•Prevent calls to other countries and national numbers with high charges

•Limit number of calls to other countries

•Limit call duration

•Block calls if thresholds are exceeded and attack seems likely

•VoIP prepaid credit

Security Measures Call Rights

Page 21: How to protect your business telephony from cyber attacks - webinar 2017, English

•Access to the network should be a privilege

•Only required and actually used IP devices

•Access rights limited to actual requirements

• In Askozia: Statistic Users, Client User Interface, etc.

•Not every user needs administration rights!

Security Measures Access Privileges

Page 22: How to protect your business telephony from cyber attacks - webinar 2017, English

•Enforce your security guidelines

•Regular review and updates

•Keep all IP devices and services up-to-date

•Don’t miss firmware and security updates

Security Measures System Hardening

Page 23: How to protect your business telephony from cyber attacks - webinar 2017, English

•There is no absolute safety

•What if a system still fails?

•Regular backups

•Premium Replacement or

•High Availability

Security Measures Have a Plan B

Page 24: How to protect your business telephony from cyber attacks - webinar 2017, English

Discover more

Have a look at our white papers and previous webinars!

askozia.com/casestudies youtube.com/askozia

Page 25: How to protect your business telephony from cyber attacks - webinar 2017, English

Questions? Time to wake up!

[email protected]