British poet, scholar, and journalist Gilbert Keith Chesterton once mused on the subject of progress:
“New roads; new ruts.”
Ah, leave it to an early 20th century British poet to keep things airy and light. However, Chesterton’s feelings may not be that far off from those in much of the business world. To many, it seems that every technological step we take forward simply leads to a slew of new problems. These days, each advance and each new technology does seem to come with a range of new security issues. VoIP is just one of the latest trends to feel the burn:
“The arrest of a wholesale VoIP entrepreneur last week for fraud and hacking points to much more than a criminal mind cheating the system - it brings to light the oft-unspoken fact that VoIP networks have a long way to go in terms of security. The publicity also scares providers and security vendors because they fear losing customers.” (From New Telephony)
Those in the business of VoIP, like those in any business, can’t afford to have their security questioned, because as we’ve pointed out several times, reputation does affect the bottom line. However, many believe that VoIP is simply undergoing the trials and tribulations of a relatively new field. It’s even suggested in the article that:
“IT folks have all but plugged security holes in data networks; the trouble is, they didn’t look at voice over the Internet in the same way.”
Unfortunately, there are still many holes left to be plugged:
“Imperva’s Application Defense Center reported on June 12 that it had discovered the vulnerability-which allows any attacker with network access to the database server to bring it down or to run arbitrary code-in DB2 Version 8…The flaw’s severity is magnified by the fact that an attacker doesn’t need database credentials to exploit the weakness, according to Imperva.” (From CIO Insight)
So, with attacks, hacks, and frauds occurring in both the data and voice network does it mean we should simply call off progress and go back to the way things were? (You know, where important information was stacked miles high in a storage room beneath thousands of file folders, and it took at least days for that information to circulate to the necessary parties in the enterprise.) Of course not. It just means that companies still have to be diligent about security and comprehensive network management. When vulnerabilities are recognized and corrected immediately, you can avoid wide-scale fraud, broad external/internal attacks, and whatever new risks progress may bring.