What is VoIP?
Authored by a Symantec employee
VoIP is an acronym for “voice over Internet Protocol.” That means any phone call that takes place over the Internet, rather than on landlines or through mobile towers. This alternative to traditional phone calls is gaining in popularity exponentially with both companies and consumers. Skype, Google Voice, and FaceTime are well- known and extremely popular examples of Internet telephony services. The question is: Are phone calls made over the Internet vulnerable to standard online security risks? The answer is yes, as is any other information transmitted this way, especially in light of recent hacks to VoIP apps. Read on to find out how to secure your VoIP calls.
Safety for every device.
Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
Security Concerns with VoIP and Similar Services
As with any communication that takes place over the Internet, there are security risks particular to this communication method. However, like all other business you transact on the Internet, some simple, common-sense precautions will go a long way toward keeping your personal information and connections secure and private:
- When using any kind of VoIP or similar method of making phone calls, make sure you keep your application software up to date. Often hackers use known exploits in the system to access your information, so it’s important to keep the client itself updated.
- It’s equally important to keep your operating system and Internet security suite updated. These are two of the main points of entry for potential hackers.
- Securing your wireless network is especially important when using VoIP, because a lot of times your phone is going directly through your router. Having a more secure router is one way to foil any potential attacks against your VoIP system. Use strong passwords to log in to messaging systems. One of the simplest ways that your account can become compromised is by using a weak password.
- Consider using a VPN to secure your Internet connection. Norton Secure VPN is a virtual private network app that secures all the information that is sent or received on your network.
Remember that when you’re using the Internet, the best thing that you can do is become a harder target than the next guy. By exercising some common-sense precautions, you can make hackers look for easier targets, protecting you and your family.
Your device may not be secure.
Public Wi-Fi isn’t always safe. Without the right protection, your personal information could become public. Protect yourself with Norton Secure VPN. It encrypts the personal information you send and receive on public Wi-Fi to help keep it private wherever you want to log on.
Help protect your information with Norton Secure VPN.
Editorial note: Our articles provide educational information for you. Norton LifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.
Copyright © 2019 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.