{"id":37244,"date":"2014-11-04T00:00:00","date_gmt":"2014-11-04T00:00:00","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/voip-security-lowdown\/"},"modified":"2024-08-27T00:27:35","modified_gmt":"2024-08-27T07:27:35","slug":"voip-security-lowdown","status":"publish","type":"post","link":"\/us\/en\/blog\/voip-security-lowdown\/","title":{"rendered":"VoIP Security: The Lowdown"},"content":{"rendered":"<p><a href=\"\/blog\/2014\/11\/voip-security-lowdown\/voip-security\/\" target=\"_blank\" rel=\"attachment wp-att-15358 noopener noreferrer\"><img decoding=\"async\" class=\"aligncenter wp-image-15358 size-large\" src=\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg\" alt=\"voip security\" width=\"640\" height=\"360\" \/><\/a>As in all things online and popular, <a title=\"Leveraging VoIP For Business Growth\" href=\"\/blog\/2014\/09\/leveraging-voip-business-growth\/?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">VoIP<\/a> needs to deal with security issues that compromise aligned businesses and VoIP users. An assault on security is a common reality of our modern digital lives. You need to know what&#8217;s happening, and how to best defend yourself and your VoIP networks.<\/p>\n<p><strong>VoIP Theft of Service<\/strong><\/p>\n<p>One of the most rampant VoIP security issues is theft of service. It could be at a basic level where login credentials are stolen and sold on the black market. Or, it could be something as big as the International Revenue Sharing Fraud (IRSF), which defrauds national carriers through their local carrier interconnect agreements.<\/p>\n<p>The most effective way of dealing with this is by securing your network. The first step is establishing strict standards in password setting. Make sure that your users are setting strong passwords by discouraging the use of their extension codes, repeating numbers or sequential patterns. Of course, this is easier said that done. Default password strength settings that are too strict can be frustrating for some users.<\/p>\n<p>Other measures include encryption and increasing physical security of servers that house user access credentials. Carriers can also use a fraud detection software to alert them of suspicious <a title=\"Answering Rules\" href=\"https:\/\/www.ringcentral.com\/office\/features\/answering-rules\/overview.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">call routing<\/a> requests.<\/p>\n<p><strong>Denial of Service Attacks on VoIP<\/strong><\/p>\n<p>Like typical <a title=\"Denial-of-service attack\" href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"noopener noreferrer\">DoS attacks<\/a>, VoIP denial of service attacks are malicious and choose one target at a time. Attacks usually originate from multiple points (often compromised computers), and send massive voice traffic to the target carrier. Anything that attacks the carrier will affect services to their users.<\/p>\n<p>There really is no concrete way of preventing attacks. Carriers can choose to use session border controllers that have anti-DoS measures included. They can also develop <a title=\"Caller ID\" href=\"https:\/\/www.ringcentral.com\/office\/features\/caller-id-control\/overview.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">caller identification<\/a> systems that authenticate calling numbers via certificates. Malicious sources of calls can also be tagged and blocked.<\/p>\n<p><strong>Interception of VoIP Calls<\/strong><\/p>\n<p>If you think call interception is just a problem for celebrities and politicians, think again. Call interception in VoIP is very real. Its purpose varies, but you should be wary of it enough to impose countermeasures. Call data can be captured through access to the network it travels on. Intercepted calls can be coursed through a proxy, which then records calls.<\/p>\n<p>Call encryption can be a way around this <a title=\"Troubleshooting 5 Common VoIP Problems\" href=\"\/blog\/2014\/10\/troubleshooting-common-voip-problems\/?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">VoIP problem<\/a>. Increased physical security of vulnerable areas is also a requisite.<\/p>\n<p><strong>Malware in Signaling and Media Sessions<\/strong><\/p>\n<p>Malware is defined as software that takes over a system and uses it to propagate itself and attack vulnerable computers. Self-propagating malware is referred to as \u201cworms&#8221;.\u00a0Malware may also be injected through your signaling and media sessions, which then infects your local system.<\/p>\n<p>Worm infiltration opens up your VoIP network, media and signaling structure, PBX, databases, user account credentials and more. It is also a major security breach that exposes your business to further attacks.<\/p>\n<p>To counter this, you can implement <a title=\"QoS: High-Quality Voice Calls\" href=\"https:\/\/www.ringcentral.com\/support\/qos-information.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">deep packet inspection<\/a>, a way of network packet filtering that examines packets for spam, viruses and intrusions.<\/p>\n<p><strong>Stay On Top of Your VoIP<\/strong><\/p>\n<p>Ideally, you won&#8217;t have to deal with breaches in your <a href=\"https:\/\/www.ringcentral.com\/office\/features\/voip\/overview.html\">VoIP phone service<\/a> security. But, it is better to be safe than sorry. It is important to stay on top of your VoIP system and how it performs, and to implement monitoring systems and safeguards as preventive walls against malicious attacks. This means implementing 24\/7 VoIP testing through services like <a title=\"voip spear\" href=\"https:\/\/voipspear.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">VoIP Spear<\/a>, imposing stricter password guidelines, physically guarding your network, and choosing a <a title=\"Security Overview\" href=\"https:\/\/www.ringcentral.com\/security-statement.html?BMID=BLOGNEW\" target=\"_blank\" rel=\"noopener noreferrer\">VoIP service provider<\/a> that takes security seriously.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As in all things online and popular, VoIP needs to deal with security issues that compromise aligned businesses and VoIP users. An assault on security is a common reality of our modern digital lives. You need to know what&#8217;s happening, and how to best defend yourself and your VoIP networks. VoIP Theft of Service One &#8230;<\/p>\n","protected":false},"author":29,"featured_media":37245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17901,18390,18391],"tags":[5217,312,5218,2559,5219,5220,335,566,251,5221,4650,5222,5223,5224,5225,5226,5227,5228,5229,5230,5231,5232,4660,4420,5233,5234,5235,183,5236,4666,1640,5237,5238,5239,5240,5241,5242,5243,5244,5245,106,2589,5246,5247,5248,5249,4677,2502,5250,5251,5252,202,4679,5253,5254,5255],"class_list":["post-37244","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-leadership","category-communication-and-collaboration","category-it-leadership","tag-access-credentials","tag-answering-rules","tag-anti-dos-measures","tag-business-security","tag-call-encryption","tag-call-interception","tag-call-recording","tag-call-routing","tag-caller-id","tag-caller-identification","tag-common-voip-problems","tag-deep-packet-inspection","tag-default-password-strength","tag-denial-of-service","tag-denial-of-service-attack","tag-dos","tag-dos-attacks","tag-extension-codes","tag-fraud-detection","tag-international-revenue-sharing-fraud","tag-irsf","tag-leveraging-voip-for-business-growth","tag-malware","tag-matt-larson","tag-network-security","tag-password-settings","tag-password-strength","tag-pbx","tag-qos-high-quality-voice-calls","tag-quality-of-service","tag-security","tag-security-breach","tag-security-issues","tag-security-overview","tag-security-settings","tag-service-provider","tag-software-security","tag-theft-of-service","tag-tips-for-voip-security","tag-troubleshooting-5-common-voip-problems","tag-voip","tag-voip-calls","tag-voip-denial","tag-voip-denial-of-service-attacks","tag-voip-network","tag-voip-network-security","tag-voip-problems","tag-voip-security","tag-voip-security-issue-is-theft-of-service","tag-voip-security-issues","tag-voip-security-problems","tag-voip-service-provider","tag-voip-spear","tag-voip-testing","tag-voip-theft","tag-voip-theft-of-service"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>VoIP Security: The Lowdown | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"As in all things online and popular, VoIP needs to deal with security issues that compromise aligned businesses and VoIP users. An assault on security is\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/voip-security-lowdown\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VoIP Security: The Lowdown\" \/>\n<meta property=\"og:description\" content=\"As in all things online and popular, VoIP needs to deal with security issues that compromise aligned businesses and VoIP users. An assault on security is\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/voip-security-lowdown\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-04T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-27T07:27:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"366\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/voip-security-lowdown\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"VoIP Security: The Lowdown\",\"datePublished\":\"2014-11-04T00:00:00+00:00\",\"dateModified\":\"2024-08-27T07:27:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/voip-security-lowdown\/\"},\"wordCount\":585,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg\",\"keywords\":[\"access credentials\",\"Answering Rules\",\"anti-DoS measures\",\"business security\",\"call encryption\",\"call interception\",\"Call Recording\",\"call routing\",\"Caller Id\",\"caller identification\",\"common voip problems\",\"deep packet inspection\",\"default password strength\",\"denial of service\",\"Denial-of-service attack\",\"DoS\",\"DoS attacks\",\"extension codes\",\"fraud detection\",\"international revenue sharing fraud\",\"IRSF\",\"Leveraging VoIP For Business Growth\",\"malware\",\"matt larson\",\"network security\",\"password settings\",\"password strength\",\"PBX\",\"QoS: High-Quality Voice Calls\",\"quality of service\",\"security\",\"security breach\",\"security issues\",\"Security Overview\",\"security settings\",\"service provider\",\"software security\",\"theft of service\",\"tips for voip security\",\"Troubleshooting 5 Common VoIP Problems\",\"VOIP\",\"voip calls\",\"voip denial\",\"voip denial of service attacks\",\"voip network\",\"voip network security\",\"VoIP problems\",\"VoIP security\",\"voip security issue is theft of service\",\"voip security issues\",\"VOIP security problems\",\"VoIP service provider\",\"voip spear\",\"voip testing\",\"voip theft\",\"voip theft of service\"],\"articleSection\":[\"Business &amp; leadership\",\"Communication &amp; collaboration\",\"IT leadership\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/voip-security-lowdown\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/\",\"name\":\"VoIP Security: The Lowdown | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg\",\"datePublished\":\"2014-11-04T00:00:00+00:00\",\"dateModified\":\"2024-08-27T07:27:35+00:00\",\"description\":\"As in all things online and popular, VoIP needs to deal with security issues that compromise aligned businesses and VoIP users. An assault on security is\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg\",\"width\":650,\"height\":366},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VoIP Security: The Lowdown\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"VoIP Security: The Lowdown | RingCentral Blog","description":"As in all things online and popular, VoIP needs to deal with security issues that compromise aligned businesses and VoIP users. An assault on security is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/voip-security-lowdown\/","og_locale":"en_US","og_type":"article","og_title":"VoIP Security: The Lowdown","og_description":"As in all things online and popular, VoIP needs to deal with security issues that compromise aligned businesses and VoIP users. An assault on security is","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/voip-security-lowdown\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2014-11-04T00:00:00+00:00","article_modified_time":"2024-08-27T07:27:35+00:00","og_image":[{"width":650,"height":366,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg","type":"image\/jpeg"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#article","isPartOf":{"@id":"\/us\/en\/blog\/voip-security-lowdown\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"VoIP Security: The Lowdown","datePublished":"2014-11-04T00:00:00+00:00","dateModified":"2024-08-27T07:27:35+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/voip-security-lowdown\/"},"wordCount":585,"commentCount":0,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg","keywords":["access credentials","Answering Rules","anti-DoS measures","business security","call encryption","call interception","Call Recording","call routing","Caller Id","caller identification","common voip problems","deep packet inspection","default password strength","denial of service","Denial-of-service attack","DoS","DoS attacks","extension codes","fraud detection","international revenue sharing fraud","IRSF","Leveraging VoIP For Business Growth","malware","matt larson","network security","password settings","password strength","PBX","QoS: High-Quality Voice Calls","quality of service","security","security breach","security issues","Security Overview","security settings","service provider","software security","theft of service","tips for voip security","Troubleshooting 5 Common VoIP Problems","VOIP","voip calls","voip denial","voip denial of service attacks","voip network","voip network security","VoIP problems","VoIP security","voip security issue is theft of service","voip security issues","VOIP security problems","VoIP service provider","voip spear","voip testing","voip theft","voip theft of service"],"articleSection":["Business &amp; leadership","Communication &amp; collaboration","IT leadership"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#respond"]}]},{"@type":"WebPage","@id":"\/us\/en\/blog\/voip-security-lowdown\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/","name":"VoIP Security: The Lowdown | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg","datePublished":"2014-11-04T00:00:00+00:00","dateModified":"2024-08-27T07:27:35+00:00","description":"As in all things online and popular, VoIP needs to deal with security issues that compromise aligned businesses and VoIP users. An assault on security is","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg","width":650,"height":366},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/voip-security-lowdown\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"VoIP Security: The Lowdown"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/voip-security.jpg","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/trending\/business-leadership\/amp\">Business &amp; leadership<\/a><a href=\"\/us\/en\/blog\/category\/trending\/communication-and-collaboration\/amp\">, Communication &amp; collaboration<\/a><a href=\"\/us\/en\/blog\/category\/it-leadership\/amp\">, IT leadership<\/a>","amp_link":"\/us\/en\/blog\/voip-security-lowdown\/amp","excerpt_title":"VoIP Security: The Lowdown","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/37244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=37244"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/37244\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/37245"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=37244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=37244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=37244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}