How to Secure Your Hosted VoIP Phone System
Why VoIP Security Matters
Your hosted VoIP phone system is a critical piece of business infrastructure. Like any internet-connected system, it can be targeted by attackers seeking to commit toll fraud, eavesdrop on conversations, or disrupt your communications. Implementing proper VoIP security measures protects your business from financial loss, data breaches and service disruption. The good news is that a secure phone system doesn't require complex technical expertise — it requires following established best practices consistently.
Strong SIP Passwords
Weak passwords are the number one cause of VoIP security breaches. Every SIP extension on your system should have a strong, unique password:
- Minimum 12 characters — Longer passwords are exponentially harder to crack.
- Randomly generated — Use a password generator rather than creating passwords manually. Avoid dictionary words, company names, extension numbers or sequential patterns.
- Unique per extension — Never reuse the same password across multiple extensions.
- Regular rotation — Change SIP passwords periodically (e.g., every 6–12 months) and immediately if a breach is suspected.
- Never share credentials — SIP passwords should be entered into phones during provisioning and not shared via email or written down.
TLS and SRTP Encryption
Encryption protects your calls from eavesdropping and your SIP signalling from interception:
- TLS (Transport Layer Security) — Encrypts the SIP signalling traffic (the messages that set up, manage and tear down calls). This prevents attackers from intercepting your SIP credentials or call metadata.
- SRTP (Secure Real-time Transport Protocol) — Encrypts the actual voice audio stream, preventing eavesdropping on your conversations.
- Enable both — For comprehensive SIP security, enable both TLS for signalling and SRTP for media. Most modern Yealink and Poly phones support both protocols.
- Verify with your provider — Ensure your hosted VoIP provider supports and recommends TLS/SRTP. Ask them for the correct configuration settings.
Firewall Best Practices
Your firewall is the first line of defence for your VoIP system:
- Whitelist provider IPs only — Configure your firewall to allow SIP traffic (UDP/TCP 5060, 5061 for TLS) only from your VoIP provider's IP addresses. Block all other SIP traffic from the internet.
- Allow RTP traffic — Voice audio uses RTP on a range of UDP ports (typically 10000–20000). Allow this traffic only from your provider's media server IP ranges.
- Disable SIP ALG — Many routers have a feature called SIP ALG (Application Layer Gateway) that attempts to help SIP traffic traverse NAT. In practice, SIP ALG causes more problems than it solves — audio issues, one-way audio, failed registrations. Always disable SIP ALG on your router.
- Use a dedicated firewall — For businesses with more than a handful of phones, use a dedicated business-grade firewall (e.g., Draytek, Fortinet, pfSense) rather than relying on a consumer router.
Disable Unused SIP Ports and Services
- Close unused ports — If your VoIP system uses TLS (port 5061), close the unencrypted SIP port (5060).
- Disable unused extensions — Remove or disable any SIP accounts that are no longer in use. Dormant accounts with old passwords are a common attack vector.
- Disable DISA — Direct Inward System Access allows external callers to make outbound calls through your system. Unless specifically needed, disable this feature entirely.
Keep Firmware Updated
Phone manufacturers regularly release firmware updates that patch security vulnerabilities:
- Enable auto-updates — If your VoIP provider manages provisioning, ensure firmware updates are applied automatically.
- Check for updates quarterly — If managing phones manually, check the manufacturer's website for firmware updates at least every quarter.
- Update promptly — When security patches are released, apply them as soon as possible. Delayed updates leave known vulnerabilities exposed.
Separate Voice VLAN
Placing your IP phones on a separate VLAN (Virtual Local Area Network) from your data network provides several security benefits:
- Isolation — Voice traffic is separated from data traffic, making it harder for malware on a computer to reach your phones.
- Quality of Service — A dedicated voice VLAN allows you to prioritise voice traffic, ensuring call quality even when the data network is busy.
- Access control — You can apply different firewall rules and access policies to the voice VLAN.
Disable Web Interface from WAN
Most IP phones have a built-in web interface for configuration. Ensure this interface is only accessible from your local network:
- Disable remote (WAN) access to the phone's web interface.
- Change the default admin password on every phone.
- If remote management is needed, use a VPN rather than exposing the web interface to the internet.
Regular Security Audits
Periodically review your VoIP security posture:
- Review SIP passwords — Ensure all passwords meet your strength requirements.
- Audit active extensions — Disable any extensions that are no longer in use.
- Check firewall rules — Verify that SIP and RTP traffic is still restricted to your provider's current IP ranges.
- Review call logs — Look for unusual patterns such as international calls, calls outside business hours, or high call volumes from a single extension.
- Test failover — Ensure your forwarding and failover rules work correctly in case of an outage.
Monitoring and Alerts
Proactive monitoring catches security issues before they become costly:
- Set up email alerts for failed SIP registration attempts.
- Configure spend alerts that notify you when call charges exceed a daily or weekly threshold.
- Monitor for international call attempts if your business doesn't normally make international calls.
- Use your provider's real-time dashboard to monitor active calls and registrations.
Two-Factor Authentication for Admin Portals
Your VoIP admin portal controls your entire phone system. Protect it with two-factor authentication (2FA):
- Enable 2FA on all administrator accounts.
- Use an authenticator app (Google Authenticator, Microsoft Authenticator) rather than SMS-based 2FA where possible.
- Limit admin access to only those who need it.
- Use strong, unique passwords for admin accounts.
Want a fully managed, secure VoIP system? Get a quote for hosted VoIP — our managed service includes comprehensive security monitoring and protection as standard.