TLS 1.2 and You: Why You NEED to Upgrade Your Security

If you’re using devices that run TLS 1.0 or 1.1, it’s imperative you change them.

TLS 1.2 and You: Why You NEED to Upgrade Your Security

With hacking techniques constantly growing more effective, it’s crucial that your UCC security is constantly updated to keep up. This also applies when it comes to one of the most long standing systems protecting communication networks: TLS.

Short for “Transport Layer Security,” TLS is a security protocol that keeps communications unreadable to eavesdroppers — but only if it’s a version that’s up to date. This is crucial to note because, due to improved code-cracking from hackers, the oldest versions of TLS, 1.0 and 1.1, are now vulnerable to attacks.

Unfortunately, this means that any devices that still use TLS 1.0 or 1.1 jeopardize the security of your entire network. Because many devices using these versions cannot be upgraded, you should immediately replace any hardware using TLS 1.0 or 1.1 with models that use a more reliable version, TLS 1.2.

You can find Wildix devices that are end-of-life due to TLS issues here.

To explain why it’s so crucial to upgrade any hardware running TLS 1.0/1.1, let’s discuss the topic in more detail.

What is TLS?

TLS is a security procedure used between two parties — a client and a server — when exchanging information over the internet.

This procedure begins with the client and the server identifying themselves, then agreeing on both a private and shared code to use in a process known as a “handshake.” After this, the connection is secure because both the client and the server are communicating through advanced cryptographic techniques, meaning only they can understand it.

In short, TLS encodes online data in such a way that even if a hacker broke into your network to listen in, they can neither understand nor decode your information. 

What’s Different About TLS 1.2?

An inherent weakness in TLS is that the security it offers boils down to secure ciphers. By design, TLS is only secure so long as its codes cannot be cracked by an outsider.

Unfortunately, this is exactly the issue with TLS 1.0 and 1.1: the ciphers these protocols create can be decoded by an outside party.

The problem here comes down to the methods of encryption that TLS 1.0 and 1.1 use, in particular a means of encoding (called a “hashing algorithm”) known as SHA-1. By now, the codes that SHA-1 generates can be cracked with fairly rudimentary tools, meaning hackers can potentially listen in on conversations encrypted with TLS 1.0 or 1.1.

This kind of flaw in cryptography is what TLS 1.2 was designed to fix. Rather than use SHA-1, TLS 1.2 uses the updated hashing algorithm SHA-256, which is still complex enough and secure enough to remain uncracked. 

As far as security goes, the difference is black and white: TLS 1.2 uses encryption that can’t be broken, while TLS 1.0 and 1.1 will always be at risk of exposure. As a result, Google Chrome and other major browsers suspended their support for TLS 1.0/1.1 in early 2020, meaning accessing them through outdated TLS devices may cause compatibility issues.

What Could Happen If I Don’t Switch?

There are two worst-case scenarios of leaving TLS 1.0/1.1 UCC devices on your network.

First, hackers or other intruders will have an easier time intruding on any communications you send over the internet. Practically speaking, this means attackers can intercept and decrypt phone calls, videoconferences or text messages, or pose as a genuine user on your network and receive communications from you directly.

Obviously, either scenario can easily result in confidential information — including corporate intel, passwords or even financial details — being leaked. Furthermore, if either happens, you won’t even know your messages are being intercepted, as if TLS is decrypted it can’t safeguard your system any further.

Second, using TLS 1.0/1.1, entities from outside your organization can register themselves on your UCC devices by obtaining a device’s credentials. The fallout of this security breach can be immediate. Once on your network, hackers can use your devices to place phone calls, which in a worst-case scenario can rack up thousands of dollars in international dialing expenses after only a few days.

Again, it cannot be overemphasized that both these outcomes are entirely possible so long as TLS 1.0/1.1 devices remain on your network. The only way to safeguard yourself from financial loss and identity exposure in this manner is to make the switch to TLS 1.2.

For added security on your network, consider making use of Wildix, the only platform on the market that’s 100% secure by design for safe communications without external SBCs or VPNs. Read the full details on how Wildix achieves that security in our security white paper.

To get more tips over digital security, subscribe to receive our magazine for free!

Improve Your Customer Journey and Contact Center Operations with x-caracal

More on the new software that improves customer interactions and empowers call centers

x-caracal by Wildix
Especially when it comes to call centers and contact centers, it’s pivotal that modern enterprises make use of a customer journey map. Customer journey mapping, in short, is the visualization of the various stages potential customers go through when interacting with a company. This is useful for understanding how these leads see your company while learning more about it. Continue reading “Improve Your Customer Journey and Contact Center Operations with x-caracal”

The Universal Value of CLASSOUND

How Wildix’s global calling service goes beyond the capabilities of a traditional SIP trunk

The Universal Value of CLASSOUND
Implementing SIP trunks — especially on an international scale — is usually a difficult process. Even after finding carriers to handle call exchanges across regions, these trunks often have poor security due to no TLS support, as well as no failover protections and difficulties in installation and maintenance.

It was in order to solve problems such as these that Wildix initially created CLASSOUND, a fully Cloud-based service that goes beyond SIP trunks in its capabilities. Using CLASSOUND, companies can enjoy the full capabilities of a communications system with global coverage, combined with the security and maintenance they’d expect from a modern enterprise-grade VoIP system.

Continue reading “The Universal Value of CLASSOUND”

Women in Tech: Interview with Arianna Caiaffa, Sales & Partner Support for G&B Connect

Arianna Caiaffa, Sales & Partner Support for G&B Connect, has been a Wildix Partner since 2010.

For Arianna, entering the technology industry was not her initial career path. After working in a design studio in the center of Milan, she received a call from G&B Connect and decided to accept a job in Sales & Partner Support. 20 years have passed since that day.

“I have never regretted taking this job,” she explained. “It has allowed me to grow as a person, and it’s a job that has evolved over time. The thing I like most about my job is that it is varied: it is not repetitive and allows me to constantly challenge myself.”

Arianna also told us, “Every day I communicate with a lot of different people, dealing with different aspects of my job: for example, pre and post-sales. In addition, I often show the solution to customers in a demo, or manage CLASSOUND and the sales cycle in all its aspects.”

When I asked what character trait helped her the most in this sector, she firmly replied that she places great importance on the daily approach with the client.

“I don’t often have the opportunity to meet clients personally, and instead I only hear from them on the phone or see them over a videoconference. The difference, in these cases, is to make a call instead of sending an email when there are uncomfortable situations to resolve.

Calling the customer quickly, with an approach geared toward listening and understanding, often makes the difference in handling any request or issue. Clients perceive me as a caring person who is attentive to their requests. This is a trait that is always recognized and appreciated.”

In April 2021, Arianna will celebrate her 20th year working at G&B Connect — quite an accomplishment. Even so, she revealed to us that, for her, being a woman in an industry historically associated with men has never been a problem. According to Arianna, what makes the difference is the people she works with and the way she relates to them. She also related that she has never had any particular problems with her colleagues of the opposite sex. Between them, there is a relationship of absolute trust and cooperation.

Arianna is not the only woman at G&B Connect. In total, the female team is composed of four women — the most recently hired of them, Arbiola Basha, is a graduate in computer science who has also independently handled the redesign of the company website.

We ended the interview with Arianna with one last question, dedicated to all women starting in the tech world today.

“Arianna, what advice would you give to a woman starting her work in a Tech company today?”

She answered:

“To never stop learning. Read, be informed and ask for information whenever there is a situation you don’t fully understand. Be considerate of clients and be careful about how you communicate with them on a daily basis. Choose the communication tool they prefer and always put yourself in an active listening position. This can really make a difference in a lot of situations!”

Wildix vs. 8×8

Wildix vs. 8x8

Comparing reliability and support

When features appear nearly identical, it’s often tempting for businesses to select their UCC platform primarily on brand recognition. And although it isn’t as if being a well known brand makes a solution better for business needs, this is often the reason that drives enterprises to select the VoIP solution 8×8. Continue reading “Wildix vs. 8×8”