security – mVoice https://www.mvoice.com.au Business Grade VOIP provider Wed, 27 Sep 2023 01:07:37 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.7 Will VoIP impact upon my businesses EFTPOS, fax and security alarm systems? https://www.mvoice.com.au/will-voip-impact-upon-my-businesses-eftpos-fax-and-security-alarm-systems/ Fri, 04 Oct 2013 03:49:47 +0000 http://www.mvoice.com.au/?p=1204 VoIP systems are often interconnected with other systems in your business, including alarm systems, fax machines and EFTPOS, all of which can run off IP in the same way as VoIP. The question is – how will your VoIP system interact with these other systems?

Let’s split them into three categories.

EFTPOS

Formally, EFTPOS relied on the PTSN (Public Telephone Switch Network) which is basically a connection to a phone line. However, with many businesses switching to VoIP, it may be a hassle to connect a PTSN phone line for EFTPOS alone. You can use your EFTPOS system through your VoIP connection, but the system must be modified to operate a VoIP service. Without this, it can be unreliable on occasion. The other option is to retain a PTSN line for your EFTPOS connection.

Fax

Yes, it’s true – people still use faxes (and you may be one of those people!). Not to worry – mVoice is taking the pain out of faxing by offering a fax to email service which is included in your monthly subscription. It works just like an email, but allows you to send faxes without needing a machine and from anywhere you can access your email. Simply type your ‘fax’ and it will be sent to the recipient’s fax machine. Conversely, any faxes you receive will be sent to your email. For a full how to, take a look at mVoice’s tutorial.

Security Alarm Systems

This can be tricky and largely dependant on your alarm system provider. Many companies connect the alarm system through a PTSN phone line but most systems can also connect through VoIP. The best thing to do is speak to our friendly customer service team, telling them the details of your alarm system and they will be able to assist you further.

 

]]>
How to Make Your VoIP Connection Secure https://www.mvoice.com.au/how-to-make-your-voip-connection-secure/ Tue, 01 Oct 2013 01:53:55 +0000 http://www.mvoice.com.au/?p=1202 Ever since Alexander Graham Bell uttered the words “Mr Watson come here, I want to see you”, people have been suspicious of who is listening to their phone conversations. In days gone by the biggest threat was the telephone exchange worker eavesdropping, but today in the age of the internet the threats of security breaches are much more varied and significant.

Protecting your sensitive information whilst using VOIP shares many of the same principles that most people employ to protect their personal computer. The key is to remain dynamic and up-to-date as well as making sensible decisions regarding usage. This can become more complicated as the business expands; here are some tips to keep on top of your internet security.

Start yesterday

It is important to start the protection as soon as possible, preferably before internet connection is established. This is to ensure that the system is covered right from the start. Without this blanket protection, some malware may sneak its way onto your system before the security cover is installed.

Be dynamic

The hacking of information is made easier when security protocols become lax and stagnate. Therefore ensure that your method of protection is dynamic and up-to-date. Whilst the constant turnover passwords can be cumbersome, it is a simple method to ward off potential threats. Creating a password that is challenging to crack is simple, but it needs to be changed often to ensure safe communication. A strong password is useful to not only protect you from outside threats but also internal ones. Unauthorised access to a system can be damaging regardless of where it originates. Ensuring a culture of password security will protect your business for years to come.

Software and firewall

The only safe place to be in the world of the internet is behind the firewall. Whilst generally it would be unsafe to hide behind a wall made of fire, it is your best bet to ward of potential threats. The combination of up-to-date anti-virus software and having all activities occurring within the firewall is the best way to shore up your defence.

Virtual Private Networks (VPN)

One method to ensure that all internal communication is secure is to establish a Virtual Private Network (VPN). This Internet based network enables all employees to connect with each other in a secure manner via the use of encrypted data. VPN is effectively a traditional intranet but is able to be accessed remotely, enabling employees to work from home and off-site. VPNs are a good option to enable on-going security in a flexible business.

Work within the capabilities

Every security system has a tipping point and when it is stretched cracks will appear. Be sure to investigate the limits and capabilities of your security system to ensure that it meets your needs. If there is a substantial increase in the number of calls, the screening and security system may become overwhelmed. Be aware of the limits and review your system regularly to ensure it is meeting the dynamic nature of business.

Intellectual property and private information are immeasurably valuable to every business. By following a few of these basic tips, this data and the integrity of the business can be protected. This allows you to get on doing whatever you do best, rather than worrying about the system’s security.

]]>