Skip to content

Blocking Compromised Extensions for Protecting SIP Remote Workers

It is the middle of the night, your team is off duty, probably sleeping, and that’s when the voice network that supports your business comes under assault. Cyber criminals take advantage of when you are least prepared because vulnerabilities can easily be exploited at these times.  

Time spent by an attacker in your system may result in possible fraud, data loss, and customer dissatisfaction. Damages caused by cybercrime are projected to exceed 10 trillion dollars per year by 2025. There has never been more urgency for immediate and effective defence mechanisms against this menace. 

The Critical Gap: Human Response Time 

Hackers constantly target remote worker Session Border Controllers (SBCs). When an attack happens in the middle of the night it can take 8-10 hours for a human to review the incident. This is unacceptable for businesses where security is top priority. The delay not only increases the damage but also the financial and reputational risk. 

Assertion’s Secure Voice solution is an effective deterrent to attacks on SBCs – it detects suspicious traffic, maps the intruder, confirms that this is indeed an attack and raises an event.  

Typically, a human is expected to review the incident and take action to quarantine or block the attacker. However, a delay between detection and response can be fatal. A Ponemon Institute study found that in 2021 the average time to identify and contain a breach was 287 days – an insanely long time in high-security environments! 

Introducing Automated IP Blocking for Secure Voice (Add-on) 

For high security customers who can’t afford this delay, Assertion offers an automated IP blocking add-on. This workflow works with Secure Voice to block the attackers IP as soon as an incident is raised – no human intervention required – and reduces response time to almost zero. The block is enforced by adding a rule in the SBC’s internal firewall or in the firewall in front of the SBC, depending on customer requirements. This proactive approach means threats are neutralised in real time, a robust defence against cyber-attacks. 

Conclusion 

Relying on human intervention for network security is no longer an option. The automated IP blocking add-on in Assertion’s Secure Voice is a must have layer of protection, so you can act fast and decisively on potential threats. With automation you can secure your voice networks, customer data and business operations even at the most critical times.