Tag Archive for: Voice

ATI Systems Mobile Solutions for Giant Voice Wins Best Mass


BOSTON, Nov. 19, 2021 (GLOBE NEWSWIRE) — Acoustic Technology, Inc. (ATI Systems), world leader in the design, manufacturing, and installation of reliable emergency warning and notification systems, was selected as the Platinum ‘ASTORS’ Award Winner for Best Mass Notification System Hardware by American Security Today for the Mobile Solutions for Giant Voice. ATI was also honored with the platinum award for Extraordinary Leadership and Innovation in Homeland Security.

ATI was also honored with the Platinum Award for Extraordinary Leadership and Innovation in Homeland Security. This award reflects a high standard of product innovation, such as the ATI Systems newest product release the ‘Next Generation of High-Powered Speaker Stations.

The new ATI speakers have a more efficient modular design, and an Intelligent Control Gateway, with an ultrafast CPU and increased memory, added network and communication ports, and a more efficient AC charger. This Next Generation High Powered Speaker Station is a game changer when it comes to helping enterprises achieve their physical security goals and maintain a modern, reliable alerting system for their people.

        

The Annual ‘ASTORS’ Awards are the largest and most comprehensive in the industry. Their purpose is to recognize the most distinguished vendors of Physical, IT, Port Security, Law Enforcement, First Responders, as well as federal, state and municipal agencies in acknowledgement of their outstanding efforts to keep our nation secure. 

The Mobile Solution for Giant Voice is portable and rapidly deployable for mass notification. Along with all ATI’s military solutions it is compliant of Unified Facilities Criteria(UFC 04-021-0). It can be deployed in a matter of hours instead of the months required to construct a permanently installed system. This provides a great temporary communication system designed with the durability of a permanent solution for any geographically dynamic project such as military emergency operations, oil and gas exploration, national border security, sporting events, large public gatherings, construction sites, and locations where a permanent mass notification system is not cost…

Source…

“Unified Technology Solution” – An InfoNetworks Service that Delivers Managed IT & Network Security Plus Voice and Internet Solutions


LOS ANGELES–(BUSINESS WIRE)–InfoNetworks today announced a new and unique service called “Unified Technology Solution.” Promoted as the answer to fill an existing void in the marketplace, InfoNetworks’ Unified Technology Solution offers businesses managed IT services, complete network security, voice and telephony services, and connectivity via a complete package from a single provider.

For more than a year, businesses worldwide have faced unprecedented global events that are dictating policies and procedures. Companies have necessarily cut key budget items, face new challenges, and manage their businesses with reduced workforce. Many of these organizations have been tasked with creating remote infrastructure to help mitigate the ever-changing landscape and support work-from-home or hybrid work environments.

InfoNetworks’ Unified Technology Solution is designed to address these challenges with an all-inclusive platform that allows employees, managers, and executives to stay connected and secure both in the office and remotely. InfoNetworks’ data connections support the added influx of traffic to the office while the included cloud-based PBX allows for extensions to be accessible via mobile device or laptop. The Unified Technology Solution network supports a mix of Desktop, Softphones, Teams, SIP and PRI interfaces. All technologies are managed by InfoNetworks’ experienced Technical Support and Network Engineering Teams and are monitored 24 hours a day, seven days a week by the watchful eye of CyberSecure(SM), an advanced Network Security Software capable of locking-down up to 500,000 end points.

“Our Unified Technology Solution is a four-pronged approach,” said Bruce Hakimi, Senior Executive at InfoNetworks. “By delivering Managed IT, Network Security, Voice and Data under one source, we can maximize the efficiency and productivity of any organization.” He further explained: “By being able to oversee all network elements from the data connection to internal Local or Cloud based Network, InfoNetworks has the advantage of acting and resolving issues quickly without having to wait for other vendors.”

Although some data carriers may offer a…

Source…

Chinese Hackers Attacked Afghan Council Network, Cybersecurity Firm Says  | Voice of America


As part of a cyberespionage operation targeting Central Asian countries, Chinese hackers recently sought to breach the computer networks of Afghanistan’s National Security Council, researchers at cybersecurity firm Check Point reported.

The alleged attack by the Chinese-speaking hacking group known to cybersecurity experts as IndigoZebra is the latest in an operation that goes back as far as 2014 and has targeted political entities in neighboring Uzbekistan and Kyrgyzstan, the researchers wrote in a report released Thursday. Other countries might also have been targeted, the researchers said.

The Afghan operation came in early April, when hackers impersonated a senior official in the office of the president of Afghanistan to infiltrate the country’s National Security Council. They did this after gaining access to the official’s email account and using it to send national security officials a “dupe email” urging action about an upcoming press conference.

“Yesterday, I called your office and no one answered it,” the hackers posing as the official wrote in the email. “We have received your file and modified it. There is an error in the third line of the second page. Please confirm whether the error exists.”

Effects unknown

Acting on the email would have activated malware, and it remains unclear if anyone on the council fell victim to the attack. A spokesman for the council told VOA he was not aware of the attempted breach.

Lotem Finkelstein, head of threat intelligence at Check Point Software Technologies in Tel Aviv, Israel, said it was highly unusual for hackers to use “ministry-to-ministry” deception, as was the case in Afghanistan, to carry out a cyberattack.

“This tactic is vicious and effective in making anyone do anything for you; and in this case, the malicious activity was seen at the highest levels of sovereignty,” Finkelstein said.

FILE - In this Aug. 11, 2019, file photo an iPhone displays a Facebook page in New Orleans.   Facebook says hackers in China…
FILE – An iPhone displays a Facebook page, Aug. 11, 2019. Facebook said March 24, 2021, that hackers in China had used fake accounts and impostor websites in a bid to break into the phones of Uyghur Muslims.

This is the first major Chinese cyberespionage operation in Afghanistan to come to…

Source…

NSA releases guidance on voice and video communications security


The National Security Agency (NSA) has released a new report giving organizations insight into the current best practices around the security of unified communications (UC) and voice and video over IP (VVoIP).

The report, titled Deploying Secure Unified Communications/Voice and Video over IP Systems, also looks at the potential risks to improperly secured UC/VVoIP systems.

Modern communications infrastructure in most organizations is tightly integrated with other IT networks, increasing the attack surface for hackers to gain access. The NSA said that UC/VVoIP devices would pose the same hacking risks to organizations through spyware, viruses, software vulnerabilities, or other malicious means if left inadequately secured.

“Malicious actors could penetrate the IP networks to eavesdrop on conversations, impersonate users, commit toll fraud and perpetrate denial of service attacks,” the NSA said in a statement.

“Compromises can lead to high-definition room audio and/or video being covertly collected and delivered to a malicious actor using the IP infrastructure as a transport mechanism.”

The report outlined the tips and tricks organizations should undertake to enhance security, such as segmenting voice and video traffic from data traffic and separate IP address ranges to limit access to a common set of devices.

In addition to using VLANs, administrators should also use access control lists and routing rules to limit access to devices across VLANs. According to the NSA, this makes it more difficult for a malicious actor to access open services on phones and servers from outside the VLAN.

Another best practice the NSA outlined is implementing layer 2 protections and address resolution protocol (ARP) and IP spoofing defenses. It also recommended only using switches with these protections. 

The NSA also said that PSTN gateways should authenticate all UC/VVoIP connections and not allow calls directly from IP phones without the UC/VVoIP server’s permission.

The agency also urged organizations to use only vendor-signed patches downloaded from trusted sources. 

The NSA said taking advantage of a UC/VVoIP system’s benefits, such as cost savings in operations or advanced call processing,…

Source…