All over the country it would seem that businesses and governments alike, are seeking out the cost and operational benefits of moving over to VoIP telephony and cloud based computing. The reality however, is that the security of these services is forever under scrutiny, with stories of high profile hacks filling the front pages of newspapers, the world over.

VoIP (telephony over an IP network such as the internet) allows you to make a call directly from a computer, a VoIP phone, a traditional telephone connected to a special adapter or a PBX system. The VoIP service uses a signalling protocol known as a Session Initiation Protocol (SIP) in order to function. Although VoIP is seemingly far more advantageous than its predecessor – ISDN, the nature of using internet to communicate with one another opens up the possibility of wiretapping.

The biggest problem, businesses have with ISDN is when it goes down. Unlike ISDN, SIP and Hosted Telephony call routing can be moved within seconds, so maybe you have another internet connection, calls are merely flipped down an alternate line, no waiting for BT to put a divert on, or undergo days of testing.

Keeping with PCI compliance, SIP Encrypt from is a wire-tap proof secure SIP Trunk. A SAFE gateway deployed at the customer site encrypts all voice calls between the customer’s PBX and, guaranteeing complete peace of mind.


 “I absolutely endorse, support and encourage the securing of voice technology. Although I think this applies in a general sense, it is paramount when considering that something as sensitive as someone’s credit card identity is at risk.”

Christian Janoff
PCI Board of Advisors
CISCO Systems



VoIP basics reveals telephony’s evolution
Telephony expert Jon Arnold dissects enterprise VoIP basics – including the technology’s evolution and how it works – and compares it with legacy telephony.


VoIP realties for small businesses
Always considering the pros and cons for your business when switching to VoIP.


Cloud Adoption Increases 15% in SMB
Cloud computing take-up among UK small to medium sized enterprises (SMEs) has increased 15 per cent in the last year, according to the latest research from BT Business and the British Chambers of Commerce (BCC).


MoD shells out £1.5bn on two IT contracts

Together the contracts aim to provide increased employee mobility, secure IT services such as cloud computing and Microsoft Office 365


Three use cases that highlight the benefits of VoIP

New technology usually implies risk. But in the case of VoIP, that concern should be nominal.


1.5 million cyber security professionals needed by 2020

The biggest problem the cyber security industry has to face today isn’t the daunting task of thwarting threats from hackers’ intent on stealing information and money, but in fact dealing with the severe lack of highly-skilled cyber security professionals.

Nine reasons you should consider implementing ISO 27001

With security breaches rising year-on-year, every organisation nowadays should consider implementing ISO 27001; here are nine compelling reasons to do so: