Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Best practices for securing voice networks

By Roger Northrop
call-center-freepik1170x658v8.jpg
April 19, 2022

Cybersecurity attacks have become so commonplace today that we are rarely surprised by widespread breaches. We have grown accustomed to reading daily headlines about bold hacks that hobble popular online platforms, hold large organizations hostage, or steal vast troves of valuable customer data and intellectual property.


This problem is so prevalent that board-level attention for security is now the norm, with a growing emphasis on safeguards for auditing and compliance. As a result, enterprise security has become a top priority for organizational resources. The average company dedicates 11% of its information security and risk management budget to protect data networks, according to the Gartner 2021 CIO Agenda Survey.  


While many IT teams have focused their security efforts on protecting data networks for email and other applications, most have overlooked criminal intrusions through the unprotected pathways of their enterprise voice networks, or phone systems.


The enterprise network is the primary conduit for hackers and ransomware gangs, but for many organizations, half of the network remains unguarded. This is because when IT and security teams talk about networks, they usually mean the data network — but every network combines a data network and a voice network. 


The Voice Network Creates a Gaping Hole for Enterprise Security

People who pick up the phone can become a biological router that bridges the information gap from voice networks over to data networks without even knowing it. For example, call center personnel typically have access to up to 15 separate information systems. Most customer service reps can log into systems for email, sales, human resources, digital imaging, and more.


Voice phishing phone calls and voice messages, also known as vishing attacks, can be a highly effective technique to trick unwitting employees in the call center and elsewhere. In this way, attackers can convince their targets to provide access to data networks, or even send the calls up the org chart to target influential financial leaders or C-level executives.


How Bad Actors Can Attack Your Voice Network

Consider a real-world case in which our security engineers assisted a clinical organization when a hacker’s phone call got through to a nurse. The nurse innocently gave the hacker immediate online access to take over her screen and all the systems she had logged into. Even worse, forensic analysis and data breach notifications were made extremely difficult because the nurse’s access was fully authorized.


From all this, we see how the voice network can serve as a nexus point for nuisance calls that reduce productivity, or even worse, for nefarious calls, leading to disastrous consequences. In fact, the hacking ecosystem has produced a new position for this strategy known as an initial access broker, or IAB. These IABs are attackers who specialize in breaching companies and then selling the access points to ransomware gangs. 


The overarching goal is to gain the trust of people inside an organization to gain illicit access to private information, contacts, credentials, and more. If an IAB interacts with the same employee by phone over time to gain that person’s trust, the attacker may eventually gain access to the adjacent data network.


Best Practices for Securing the Voice Network

We know that cybersecurity incidents and data breaches are continuously evolving and increasing. For this reason, most data networks today are protected by broad intrusion detection systems (IDS) and intrusion prevention systems (IPS). These software layers constantly monitor data networks to identify potential incidents, stop them, and report any threats to security administrators.


However, voice networks have no such IDS or IPS systems in place. Nor do they have security protections to control the fallible humans who represent the ultimate endpoints of the voice network. Protecting the voice network requires security teams to implement a multilayered architecture or mesh security strategy while better preparing the staff to recognize potential threats on their phones.


Addressing this problem starts by gaining visibility into all the underlying vulnerabilities. A comprehensive voice traffic assessment provides a good starting point to handle the types and volumes of calls running over a voice network. 


Security teams can then take steps to build in necessary security protections and hold staff trainings to promote greater awareness about the threats to voice networks from simple phone calls or text messages. Unfortunately, voice network security presents a serious threat that usually does not get adequate attention until too late. Taking preventative steps now can help offset this growing concern.

KEYWORDS: cyber security data breaches risk management Vishing voice fraud

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Roger Northrop is Chief Technology Officer at Mutare.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • multicolor pyramid on red orange background

    The threat landscape and best practices for securing the edge

    See More
  • Locked data

    Best practices for effectively securing sensitive data

    See More
  • Inside of water disposal pipe

    Best practices for securing critical and public infrastructure

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing