

- #SIGN UP FOR BETA SKYPE FOR BUSINESS MAC INSTALL#
- #SIGN UP FOR BETA SKYPE FOR BUSINESS MAC SOFTWARE#
Skype traffic is encrypted between point A and point B, so it's theoretically impossible to intercept a Skype call and encrypt it. You just drop this thing, listen, and you can recompile conversations. There are lots of tools, like Vomit and VOIP Pong for instance, which allow you to record unencrypted voice packets and recompile it. This is the unique thing abut Skype that doesn't occur in most VOIP: Most companies do not encrypt their VOIP traffic, a major flaw. What about eavesdropping? Does Skype technology make this any less or more possible with conversations? So from that perspective, it's not a really big concern. These systems are all over the world, its not one box that you invade. What happens is when someone wants to call someone else, unlike a VOIP gateway or a telephone, you have to know who you are calling, click on it and it goes out to the Skype infrastructure and pings it. Is there something that sits on the internet with Skype that can be attacked to take it down? No, not really: Because your client doesn't know about any infrastructure. But that is long term issue with IM that has always existed. What could potentially happen is an IM could go out to the client, a user could potentially click on that message and take down or infect that computer. But Skype users can communicate by voice, video and instant messaging. How might something like a DDoS attack play out with Skype?įortunately for most businesses that use Skype, they will have traffic over Port 80, or your other typical web-surfing ports. We know that a DDoS (denial of service) attack can happen at various layers with a VOIP system. Anything they chat about has to be able to be logged and printed out. For example, if you have employees trading stocks, bonds, anything like that, you can't use an IM solution (which Skype contains) unless it is actually auditable.

The first thing an administrator should do is say 'what are my rules about this? Do I have requirements that say I have to capture IM traffic?' for instance.
#SIGN UP FOR BETA SKYPE FOR BUSINESS MAC INSTALL#
If you're a local administrator, and you're going to install the product, now, all of a sudden, you have texting and voice conversations that are potentially encrypted and something that the enterprise or company can't monitor. So every enterprise has the challenge of controlling the proliferation of Skype into the environment. You have to set the rules that govern what you are going to do or allow with any piece of software.
#SIGN UP FOR BETA SKYPE FOR BUSINESS MAC SOFTWARE#
In any corporation, if you are going to install software on end-users computer, you have to do your governance. Often Skype is an option for some of these companies.Īre there security concerns with Skype that are unique when compared to other VOIP solutions? Another common use I've seen in business is in outsourcing off-shore resources like help desk or support scenarios where you have a lot of people outside your state and doing off-hour support. Michael Gough: Predominantly it is still used by individuals, but a lot of small-to-medium-sized businesses utilize Skype to cut costs for things like road warriors. But as it stands now, do you think it is used in many business organizations?

CSO: We know that Skype is making a play for business customers with Skype for SIP.
