VoIP phone systems use the internet just like any PC. Therefore, hackers can gain access to your servers and data network through VoIP phones. Understanding how to combat theft of service in VoIP is critical, so if you want to learn how to do it, read on. What is theft of service? Internet-based phone systems […]
During a week of such tragedy, it’s hard to give much thought to network and information security (InfoSec). Yet, we must stay vigilant, lest abhorrent cyber criminals leverage such tragedies against us in social networking campaigns.