Your communications systems provide critical access to customers and business partners, and you likely have an extensive security policy in place to ensure their protection. From encryption to next-generation firewalls, you have taken time to consider different types of attacks that could threaten your Voice over Internet Protocol (VoIP). From a response standpoint, you likely have a disaster recovery plan in place that includes steps for recovering backup data and continuing business … [Read more...]