Page 9 - Telecom Reseller August-September 2018
P. 9
12 Cloud Questions
TR
The Newsource on UC ● UCaaS ● Collaboration ● Mobility
VIEW
The Latest EDUcasts
Telecom Reseller 13 Every Company
p1-24_TR
thaltewniaesnacbylebetoinpgeonffeterraetde thoevciolmatpoarns.y’s defenses and gThranetetxhtenattaocfkoergsaanciczeastsiotonspthyaotnarceusutobmjeecrts’ photonePCcaIllcso. mpliance is staggering. More than 12
Imnitleliromnsboufsainpersascetsicianl tChyebUernsietceudrSittyatsetrsaatcecgeyp, t
j u s c t a l i r k d e - b t h a e s e a d t t a p c a k y mc o e n n s t i s s , t e t d h r o o f u b g o h t h o n e l l e i n m e e , n m t s o , b i l e ,
humanadnvaonidceteccohmnmolougniicalt,isoontso, oa,npdroartecthioenrefore
January/February 2016
Upgrade your Router
August/September 2018
Telecom Reseller 9
TR
The Newsource on UC l UCaaS l Collaboration l Mobility
p1-24_TR_JanFeb_2016.indd 13
05/02/2016 20:0
VIEW
Should Ask Itself
Voice QoS, Multi WAN Redundancy, Content Filter & Network Security
TELECOM
Call AB
1-1600 to discuss your application. www.DrayTekUSA.com COLWELL RUFFIN PATTERSON
GE 15
P at 972-83
PA
RESELLER .COM
The Newsource on UC
Cybersecurity Solutions
TR The Latest
O Design Determines
PAGE 23
By Pat Patterson, Director of Services for Avaya
VIEW
Podcasts
T
agement Success
Telecom
D oviders surge, driven by corporations interested
rganizational elecom Man
● UCaa
Subscribe to The Channel Daily News
eBull
O
C
eti
Organizatio Telecom M
n
Nortel Notes
S ● Collaboration ● Mobility 12 Cloud Questions
In a recent Cybersecurity briefing for the
Telecom Industry, Deloitte published an article
(https://www2.deloitte.com/global/en/pages/
risk/articles/Telecommunications.html) that
discussed three case studies illustrating how and
for Telecom Pr
em
lo
and
for c
ud se
well-founded) fears about the security of a cloud
scope of the attack did significant damage to the
organization’s repu
t
lity of the
h
u
tp
e
C
riva
entire telecom sector.”
cy,
wh
o
tatio
n
ich
i
Be Fooled into
o
m
p
l
a
t
a
that accept credit card payments, setting a media account of privileged users - There are
host of developments into motion for industries
sev
era
lis
sues
that utilize contact centers—and consequently,
hig
h
lig
ht
l Social Element - People with high-level for resellers of contact center solutions. PCI
regulations. This means the market base for
pri
rvice
Whenipnesrofoftrwmairnegflaenxaibnialiltyysiasnodf tshcealsapbeicliitfiyc. sBut
na
infrastructure. It also fueled customer concerns
abo
by Will Melendez,
sa
sig
ed
her
c
clearance accessing personal social media websites compliance mandates are rigorous, fees for non-
on company assets.
MELENDEZ
compliance can be debilitating, and there is little l Social Element - How did attackers know
leniency being offered to violators. whom to target?
The extent of organizabtyioWnsilltMhaetleanredeszu,bject Social Element - How did the person get
to PCI compliance is staggering. More than 12 redirected to the phony website?
million businesses in the United States accept
2. The spoofed pages then installed malicious
cardT
(www.voice4net.com)
-based payments, through online, mobile, software on the users’ computers - this is a
and voice communications, and are therefore TechnolohgeicPaCl InSveacsuiornitycoSmtapnodnarednst.Council has
nd
co
n
vilegetshtaotpaecnceptrtacteredeietpclayrdinptoaythmeecnotms,pseatntyin’sg a
companies who need to implement compliant nethwoosrtko-f dTheviselpoaprmt ceonttsaintsobmotoht,itohnefsorcinaldaunsdtries
contact center solutions is similarly wide- tecthnaotluotgiilcizael ecloenmtaenctsc:enters—and consequently,
reaching.
lforSroecsiealleErlsemofecnotn-tWacthycednoters osonleuptieornsso.nPhCaIve
suchomhipghli-alnevcelmacacnedssateoscaorme rpiagnoyroduast,a?fees for non-
t
C
MELENDEZ continues on page 16 ›› lcomTepclhiannocloegciacnalbInevdaesbioilnita-tMinagl,icainodusthsoerftewisarleittle
agasiunbstjescutcthoaPttCaIckDsSrSeq(uDiraetabSoethcuerleitmy eSntatsn:daards)
h u mr e a g n u l e a l t e i mo n e s n . t Thw h i s i c m h e c a o n n s s t i s h t e s mo f a e r d k u e c t a b t i a n s g e f o r
onecsoemlfpoanntihese winhoerneenetdatongimerps,leamndenutpcdoamtinpgliant
comcopnatnayctpcoelnictiers stolauctcionusnitsfosirmpiolaternlytiwalidries-ks, as
werlleaschiminpgl.ementing a robust technological safety
net to shield against any kind of technological
MELENDEZ continues on page 16 ›› attack. The attack in this case study contained 4
continuesonpage 11 ››
nifi
s co
c
e.
nfi
ca
Executive Vice President of
he
TDon’t Let Your Clients attack, the two elements, described earlier, become
Global Sales at Voice4Net
If we analyze the methods used to carry out the
(www.voice4net.com)
he PCI Security Standards Council has apparent:
established strict guidelines for companies 1. The attackers spoofed the personal social
C
c
e
y
ntinues to
VIEIEW The Latest EDUcasts
Every Company
CHANNEL
how secure is the cloud? No surprise, analysts
why cybercriminals target Telecom Providers.
asktheceo.biz)
in software flexibility and scalability. But
predict security products and cloud-based
GOTTHEIL
Should Ask Itself
security services will be a nearly $9 billion market
by Avrohom Gottheil, Founder by 2019. & Host of #AskTheCEO (http://
With recent high profile cyber-attacks at companies like Sony and U.S. government
PAGE 15 PVAIEGW E 12 TELECOM
LWELL RUFFIN
PATTERSON
RESELLER .COM
Deloitte states “Telecom companies are a big
agencies, cloud security is in sharp focus. companies are not only referring to the Telecom
Vendor Management: The Convey Adds MessagePro Text
control, and operate critical infrastructure that
By Pat Patterson, Director of
NextBigOptimization Opportunity
MessagingPlatformtothe ChannelAcceleratorProgram
anagement Success
Telecom
a subscription-based cloud service) but may not such as Contact Centers, which include functions
The Latest
PAGE 15
PAGE 23
As we said in August, the C-suite likes the providers themselves. Instead, they include every
Podcasts
is widely used to communicate and store large
target for cyber-attacks because they build,
nal Design Determines
Nortel Notes
cloud’s flexible OpEx model (often deployed as organization that providSesrvTieclescofomr Asvearyvaices,
amounts of sensitive data.” It’s important to note that the specific threats facing Telecom
D
totally grasp the implications of adopting the such as CeumstaonmdefroSrucplopuodrt,sSeravleisceHsoctolinteins,uaensdto
cloud. This can lead to well-founded (and not so Helpdesksu. rge, driven by corporations interested
We can confidently say that we have the best hardware rental program in the industry. Our Device as a Service (DaaS) rental program gives your customers the widest variety of VoIP Products for a low monthly payment!
Why Join the VoIP Supply Rental Program?
Fast & Easy to Apply — One-page application
Approved Within Days
Wide Variety of VoIP Products (phones, conference phones, PBXs, and more)
If you are interested in joining the VoIP Supply DaaS Rental Program please email us at voiprental@voipsupply.com and request the form!
Rent Brands Like:
_JanFeb_2016.indd 13
AND MANY MORE!
From hardware to service, we have
everything you need for VoIP
800-398-8647 | www.voipsupply.com/vs-rental-program
solution. As a result, many large companies are
of ehaocwh astetcaucrkeciasstehsetucdloyu, pdr?eNseontseudrpbryisDe,ealoniattley,sats
investing in the private cloud, while slowing their comprmedoinctthsecmueriptyrepsreondtsuicttsselaf.nFdocrloeaucdh-binacsiedent,
use of the public cloud. thesrecaurreitywsoerevleimceesnwtsi:llabtecahneoalorlgyic$a9l binilvlaiosinonm, arket
According to one estimate, companies with andbyan20e1x9p.loited human vulnerability which was
more than 1,000 employees use an average influeWnciethd rveiacesnotcihailgehnpgirnoefielreincygb. er-attacks at
of 1,154 cloud-based services, “ranging from
L c e o t m’ s p e x a a n mi e i s n l e i k a e c S a o s e n y s t a u n d d y , Ua n . S d . g d o e v t e e r r mn mi n e e n t t h e
corargeecnt cstireast,ecgloyutod saefceugruiatyrdisaignaisnhsatrspucfohcauns.
PATTERSON continues on page 21 ›› a t t a c kA. s w e s a i d i n A u g u s t , t h e C - s u i t e l i k e s t h e
CclaosuedS’stufldeyx:ibAlenOatpioEnx-smtaotedlealu(nocftheenddaespulcocyesdsfausl
PCI Compliance in
cybaesru-abtstaccrkipatigoanin-bstaaseMd ocbloiluedCsoemrvmicue)nbicuatimonasy not
Protvoitdaellrytgorsapsyp othnelaimrgpelgicraotuiopns sofomf aodboipletipnhgotnhe usecrlso.uThd.eThcyibsecra-ncrliemadintaolswuesleld-foaucnodmebdin(antidonot so
the Contact Center:
of swevelelr-afol udniffdeerden) tfeteacrshnabiqouetstthoecsaercruyroituytothf ea cloud attascoklu: t“ioThn.eAatstacrkeesrusltfi,rmstasnpyoolafregdetchoempeprasnoineaslare
D
o
so ciinav
dniga
atghe
eilce
du, sw
s
n
l ems
hr
’
tei
ipn
es po
t
L
e
Be Fooled into
t
Y
frip
o
vraitv
lgoeud
istlho
ing their
theucsoemofptahney.pThubeliscpcolofued. pages then installed malicAiocucsosrodftinwgatroe onetheestuimseartse’ ,ccoomppuatenrise,s with
takminograedtvhanta1g,0e0o0f tehmeiprloelyeeveasteudsesyasnteamverage priovifle1g,1e5s4toclpoeunde-tbratseedeseprlvyicinetso, “trhaencgoinmgpfarnoym’s
Complacency
network. This vulnerability ultimately allowed
u
PATTERSON continues on page 21 ›› the attackers to access mobile communication
r
C
l
nt
issu
e
silwe
iwn
i
e
den
e
n
Executive Vice President of
Global Sales at Voice4Net
subject to PCI DSS (Data Security Standards)
3. Takeinstgaabdlivshanetdagsteriocfttghueirdelienveastefdorsycsotmempanies
E
n
tia
t
e
fo
Z
e
t
data for surveillance purposes. The size and
PCI Compliance in
M
E
L
E
N
D
r
rt
:
05/02/2016 20:02