Category Archives: Broadband

The Top Cloud Computing Threats in an Enterprise Environment

http://www.dreamstime.com/-image24630377There are companies with operational models 90% based on cloud services, and the rest of the 10% is constituted wi­th in-house servers. The basic response after asking about security issues related to cloud services was that the cloud service provider will take care of them and they don’t have to worry about it.

This isn’t necessarily the case with every cloud service provider, since some CSPs have a good security model in place, while others clearly do not. There are many advantages of cloud services, which is why the cloud service model is being used extensively, but they are out of scope of this article.

Before continuing, let’s quickly define a threat. A threat is an actor who wants to attack assets in the cloud at a particular time with a particular goal in mind, usually to inflict his own financial gain and consequentially financial loss of a customer.

Before deciding to migrate to the cloud, we have to look at the cloud security threats to determine whether the cloud service is worth the risk due to the many advantages it provides. The following are the top security threats in a cloud environment:

Ease of Use

The cloud services can easily be used by malicious attackers, since a registration process is very simple, because we only have to have a valid credit card. In some cases we can even pay for the cloud service by using PayPal, Western Union, Payza, Bitcoin, or Litecoin, in which cases we can stay totally anonymous. The cloud can be used maliciously for various purposes like spamming, malware distribution, botnet C&C servers, DDoS, password and hash cracking.

Secure Data Transmission

When transferring the data from clients to the cloud, the data needs to be transferred by using an encrypted secure communication channel like SSL/TLS. This prevents different attacks like MITM attacks, where the data could be stolen by an attacker intercepting our communication.

Insecure APIs

Various cloud services on the Internet are exposed by application programming interfaces. Since the APIs are accessible from anywhere on the Internet, malicious attackers can use them to compromise the confidentiality and integrity of the enterprise customers. An attacker gaining a token used by a customer to access the service through service API can use the same token to manipulate the customer’s data. Therefore it’s imperative that cloud services provide a secure API, rendering such attacks worthless.

Malicious Insiders

Employees working at cloud service provider could have complete access to the company resources. Therefore cloud service providers must have proper security measures in place to track employee actions like viewing a customer’s data. Since cloud service provides often don’t follow the best security guidelines and don’t implement a security policy, employees can gather confidential information from arbitrary customers without being detected.

Shared Technology Issues

The cloud service SaaS/PasS/IaaS providers use scalable infrastructure to support multiple tenants which share the underlying infrastructure. Directly on the hardware layer, there are hypervisors running multiple virtual machines, themselves running multiple applications.

On the highest layer, there are various attacks on the SaaS where an attacker is able to get access to the data of another application running in the same virtual machine. The same is true for the lowest layers, where hypervisors can be exploited from virtual machines to gain access to all VMs on the same server (example of such an attack is Red/Blue Pill). All layers of shared technology can be attacked to gain unauthorized access to data, like: CPU, RAM, hypervisors, applications, etc.

Data Loss

The data stored in the cloud could be lost due to the hard drive failure. A CSP could accidentally delete the data, an attacker might modify the data, etc. Therefore, the best way to protect against data loss is by having a proper data backup, which solves the data loss problems. Data loss can have catastrophic consequences to the business, which may result in a business bankruptcy, which is why keeping the data backed-up is always the best option.

Data Breach

When a virtual machine is able to access the data from another virtual machine on the same physical host, a data breach occurs – the problem is much more prevalent when the tenants of the two virtual machines are different customers. The side-channel attacks are valid attack vectors and need to be addressed in everyday situations. A side-channel attack occurs when a virtual machine can use a shared component like processor’s cache to access the data of another virtual machine running on the same physical host.

Account/Service Hijacking

 It’s often the case that only a password is required to access our account in the cloud and manipulate the data, which is why the usage of two-factor authentication is preferred. Nevertheless, an attacker gaining access to our account can manipulate and change the data and therefore make the data untrustworthy. An attacker having access to the cloud virtual machine hosting our business website can include a malicious code into the web page to attack users visiting our web page – this is known as the watering hole attack. An attacker can also disrupt the service by turning off the web server serving our website, rendering it inaccessible.

Unknown Risk Profile

We have to take all security implications into account when moving to the cloud, including constant software security updates, monitoring networks with IDS/IPS systems, log monitoring, integrating SIEM into the network, etc. There might be multiple attacks that haven’t even been discovered yet, but they might prove to be highly threatening in the years to come.

Denial of Service

 An attacker can issue a denial of service attack against the cloud service to render it inaccessible, therefore disrupting the service. There are a number of ways an attacker can disrupt the service in a virtualized cloud environment: by using all its CPU, RAM, disk space or network bandwidth.

Lack of Understanding

Enterprises are adopting the cloud services in everyday operations, but it’s often the case they don’t really understand what they are getting into. When moving to the cloud there are different aspects we need to address, like understanding how the CSP operates, how the application is working, how to debug the application when something goes wrong, whether the data backups are already in place in case the hard drive dies, etc. If the CSP doesn’t provide additional backup of the data, but the customer expects it, who will be responsible when the hard drive fails? The customer will blame the CSP, but in reality it’s the customer’s fault, since they didn’t familiarize themselves enough with the cloud service operations – the result of which will be lost data.

User Awareness

 The users of the cloud services should be educated regarding different attacks, because the weakest link is often the user itself. There are multiple social engineering attack vectors that an attacker might use to lure the victim into visiting a malicious web site, after which he can get access to the user’s computer. From there, he can observe user actions and view the same data the user is viewing, not to mention that he can steal user’s credentials to authenticate to the cloud service itself. Security awareness is an often overlooked security concern.

Conclusion

When an enterprise company wants to move their current operation to the cloud, they should be aware of the cloud threats in order for the move to be successful. At InfoStructure, we make every attempt to secure our networks and cloud platforms to protect our customers from malicious attackers. If you have any questions about how we keep our customer’s information secure, please feel free to call us at 541.773.5000.

VoIP (Voice over Internet Protocol) Solutions Becoming More Popular for Small Business Phone Systems.

virtual phone system

A new report by VoIP software analysis company, Software Advice  surveyed over 350 businesses and found that although small businesses still rely on both landlines and mobile phones, small businesses are shifting towards virtual phone systems. This report surveyed over 350 businesses with annual revenues of $190 million or less during 2013-2014 – the goal of the report was to try to determine pain points and reasons for purchasing a new business phone system.

  • More than half of potential buyers were investing in business VoIP service for the first time.
  • Scalability and reliability were the primary concerns when evaluating new phone systems.
  • A vast majority wanted a hosted solution, not an on-premise IP-P­BX.
Traditional PSTN and mobile connections going to the wayside

The research concluded that 31% of small businesses were still using a landline and 13% relied exclusively on their mobile phones as their main source of business communications. Over half of buyers (57%) asked said that they were looking to invest in a VoIP service for the first time.

Reliability and scalability important factor

17% of the sample noted lack of reliability as the largest issue with their current business phone system. Issues with connectivity and dropped calls were frequent problems for the surveyed buyers. Other buyers noted that their system’s maximum capacity was not large enough to accommodate company growth – about 15%.

Top reasons for new purchases

15% of those businesses surveyed said that a system with a lower price was important, 14% said that increased functionality was another major incentive to switch to VoIP.

Support was a major pain point for many buyers. One buyer noted that every time he needed to make changes to the system, he had to call someone else to do it.

Surprisingly for telecom professionals, improved call quality was not a major concern. Only a few buyers reported audio quality issues such as “static.” This finding is congruent with the results of a recent survey conducted on public concerns about VoIP, which found that only 10% of consumers were worried about call quality with VoIP services.

Cloud-based systems popular with small businesses

The reliability and support concerns that were uncovered create a high level of interest in hosted (web-based) solutions. None of the small business owners that were surveyed wanted to purchase an on-premise IP-PBX. 77% of the sample wanted a web-based solution, while 23% did not have a preference. This suggests that many small businesses do not have the IT staff necessary to maintain an on-premise system. Buyers like this tend to prefer a hosted solution that maintains itself and also grants administrative and user access through an internet browser.

Most desired applications – Auto Attendant at the top

Most buyers surveyed wanted private branch exchange (PBX) functionality from their phone systems—and those who did not specify this preference probably wanted a PBX without knowing the word for it, since PBX functionality is the backbone of a small business phone system.

After the need for extensions and directories, an auto attendant was easily the most in-demand application among the buyers surveyed. The popularity of the auto attendant stems from its ability to make any small business sound like a larger enterprise – for example, a local pet store. One business owner noted that he wants an auto attendant to give the appearance that his company is larger than it really is.

Voicemail-to-email and number portability also important

The death of voicemail has been proclaimed for nearly a decade now but more buyers (28%) requested this feature than any other. Also, 9% of buyers expressed a high level of interest in caller ID and 7% in voicemail-to-email functionality. Another very popular feature is number portability (7%). A number of buyers insisted that keeping their original number was a requirement. Not having number portability was a deal breaker for many small-business owners.

Conclusion

Even though many still rely on landlines or mobile phones, the data shows that small businesses are shifting toward VoIP solutions. These buyers are interested in solutions that are scalable and reliable. They want to add users easily and inexpensively as their business grows. Few buyers surveyed have an IT background, so effective technical support and reliability is very important. Small-business owners are interested in unified communications solutions that offer features such as voicemail-to-email. Since 13% of surveyed buyers are reliant on their mobile phones for business communications, small-business owners are interested in remote access and control of their phone systems. As VoIP technology continues to advance, it will become easier for small businesses to integrate voice calling, video conferencing, email, voicemail and chat using technologies that were formerly restricted. If you are interested in VoIP as your small business phone system then contact InfoStructure today to find out how your business phone system can be upgraded to a hosted PBX at an affordable price.

Top 5 Ways to Speed up Web Browsing

speed up your internet1. Use passwords that are secure

If your browser offers a master password option, use it. If you are using one weak password with all your site logins, you could be jeopardizing your private data. Using a secure password system can fix that. If you’re using different browsers across different systems, you can keep your password synced with Dropbox, or take care of bookmarks as well with Foxmarks (Firefox only).

2. Use OpenDNS on your browser and/or router

With OpenDNS (a free service that can speed up your page connections) open pages from keyword shortcuts, operate with a parental filter, and avoid spam pages. This service provides detailed how-to instructions for both individual computers and routers, so it’s definitely worth a try.

3. Block Flash and/or JavaScript

If you are using Firefox, install the Adblock Plus and Flashblock extensions, and sites slowed down by Flash and huge display ads will load quite a bit faster. If you’re able to tweak your router, set up universal ad-blocking through it with the Tomato firmware, or use a solution specific to Chrome, on Internet Explorer through the Toggle Flash add-on or IE7Pro plug-in, and even on your iPhone or iPod touch.

4. Use RSS feeds and mobile versions instead of heavy sites

RSS feeds are great for getting a lot of reading done in a short amount of time. Google Reader webapp and NetNewsWire/NewsGator’s desktop clients are both great way to catch up on your regular web reading with a minimum of bandwidth or witout a connection whatsoever. You can run any site that is loaded full of news through the Google Mobilizer for a version that is fast enough for a mobile phone, and very fast on a desktop.

5. Tweak Connection rates on your home wireless network

Your wireless router can actually regulate bandwidth while watching your XBox, BitTorrent downloads, multiple laptops, and other web-connected apps and gear fight it out for a finite amount of bandwidth. Many routers let you negotiate connection rate using quality of service settings. Those routers that don’t have these settings can often be made to do so by installing DD-WRT or Tomato. The end result? You can let heavy video games run in the evenings, set BitTorrent free in the middle of the night and keep your browser quiet during the day.

InfoStructure Voices in on IP Phone Security

cyber pirateJust recently, InfoStructure employee Derrick Sisson came across this article in which a small business is now faced with a $166,000 bill for fraudulent telephone charges. Derrick says, “There are several ways fraud like this happens. Of course we all know the dreaded SIP hacks and VoIP weakness of being out on the internet, but that’s not the only way a customer is vulnerable to fraud….Once they have access they are able to do anything they want including  making International calls undetected by the customer…” We are aware of the risks that face IP Phone systems and below are some ideas that will help maintain the security of your IP Phone System.

Protect Your Voice!

Hacking into phone calls via IP Telephony (also known as VoIP) opens a veritable gold mine of valuable data and information. Large financial boons are at risk in government agencies, financial institutions, and professional services firms. Also at risk are call centers where health records, confidential account information and payment card data can get hacked. Hacking voicemail has also become popular as it exposes private business information and celebrity secrets. Toll fraud is also being committed by large groups of phone pirates who are committed to compromising the security of your phones.

Doing Nothing Can Be Costly

The risks in VoIP go beyond eavesdropping, toll fraud, and voicemail hacks. IP phones can also be entry points into your business network. VoIP calls and voicemail messages are data and can possibly get hacked. If you use a hosted IP phone service or a VoIP system, protecting these networks are similar to protecting a data network. The security policies and technologies can be complex, depending on the IP phone system you’re using, whether onsite or hosted. Following is an introduction to some IP phone security strategies:

Scrutinize Your Hosted VoIP System

Evaluate services such as user authentication, encryption, and VLAN configuration and also check the security of configuring and signaling methods. Also investigate any HIPAA, SOX, PCI, or other compliance guidance that apply.

Take advantage of features on your VoIP system that enable security. Essentially:
  • Place network restrictions on types of calls by device, user, and other criteria.
  • Control voice network access by user name and password and/or device certificate.
Apply physical and logical protection, such as:
  • Install OS updates and limit software loading on phones.
  • Lock voice servers for administration. Use domain restr­­­ictions and two-factor authentication for administrative access, including signaling data, configuration files and credentials.
  • Set up a firewall and intrusion prevention system (IPS) to regulate authorized and unauthorized VoIP traffic and to track abnormal voice activities.
Use VLANs to Segment Voice Traffic and Separate It from Data Traffic
  • Some voice systems and switches support device discovery protocols and automatically assign IP phones to voice VLANs.
Sensitive Voice Traffic Should Be Encrypted
  • Encrypt your Internet gateway with Session Initiation Protocol (SIP) over Transport Layer Security (TLS).
  • Apply encryption by segment, device, or user; indiscriminate encrypting can result in excessive network latency or introduce operational overhead and complexity.
  • Encrypt the media (packets) with protocols such as SRTP.
  • Use VPNs for network connections by remote phones. This is important when SRTP or HTTPS is not available.
Implement Strict Security Policies with Users
  • Communicate your phones’ built-in security features to users.
  • Apply strong passwords to access the voicemail inbox. Immediately change the default password to a strong password, then change it as often as your company’s policy dictates for changing login and email passwords.
  • Delete sensitive voicemail messages as soon as users have listened to them. Not storing voicemails is the easiest and most effective way to protect them.
  • Immediately report anomalies. You may not know a phone has been hacked until an employee reports an odd occurrence, such as a saved voicemail message that has been deleted or forwarded to an unusual number.

Don’t let cybercriminals find your IP phones and voice systems accessible to attack. Equip yourself with tools that protect your sensitive data files today.

 

Businesses Bandwidth and the Need for Speed

It may be tempting to believe that information comes out of thin air, but the infrastructure of internet communication is not magic. Rather, data runs on physical lines and through network devices that can only carry a finite amount of traffic. Given that business functions are increasingly turning over to web applications, customers are using the internet as the primary point of contact with a business, and phone lines are increasingly being replaced with voice over IP (VoIP) systems, a company cannot neglect its bandwidth needs.
It is not uncommon to hear the results of dropped packets due to bandwidth constraints when using web applications such as Skype. Audio calls, video conferencing, media streaming, employees running media from third-party sites, and other bandwidth intensive uses compete with traffic needed by applications that handle primary business functions. There are some general guidelines for how much bandwidth a business may need:
• 2 megabytes per second will cover medium to low-definition video chat, social media, limited voice calls, and most inter-office text communication such as IM and email.
• 5 megabytes per second will cover all of the above plus high definition video and medium file transfers.
• 10 megabytes per second will enable large file transfers and most of the other intensive, high-tech needs of a modern business.
A business should consider high-speed internet and its network capabilities with as much thought as its business plan, its recruiting/talent retention, and its sales/marketing efforts. In order to ensure that your bandwidth capabilities are up to par with the strategic vision of your company, contact your trusted service provider.

Exciting Trends in IP Business Communications for 2013

The Emerging Mobile Majority
The rapid adoption of mobile devices in the workplace continues to enhance productivity and efficiency. A recent report by Forrester observes, “A full 66 percent of employees now use two or more devices for work every day including desktops, laptops, smartphones and tablets.”

Integrating Public and Private Clouds
The emerging mobile workplace requires an ability to switch between public and private clouds, and to do so both securely and seamlessly. Companies will be challenged to enthusiastically and competently embrace change and support cloud-based applications.

In 2013, in excess of 60 percent of companies will have instituted cloud computing to some degree, according to a recent Gartner report.

Security Initiatives
The need for cloud-based security is no longer just good business, it is essential. The need to protect proprietary data is self-evident. So is the need to keep customer information secure as well.

Also, legal mandates are as substantial as ever. Current initiatives include health care clouds to address privacy requirements under the Health Insurance Portability and Accountability Act (HIPAA). The public sector is looking to cloud-based solutions to maintain compliance with the Federal Information Security Management Act. Finally, the payment card industry’s rapid emergence in mobile device-based transactions creates a host of new security needs in the cloud.

IP Traffic Growth — 29% per year
The pervasiveness of mobile devices and cloud-based computing will be driving forces in 2013 and beyond. The Cisco Visual Networking Index projects annual compound growth in IP traffic of a dramatic 29 percent through 2016. Consumers and employees alike will increasingly expect smart and secure networks to enhance their productivity and their lives.

About Us
InfoStructure is one of a new generation of IP business communications providers that is creatively harnessing the internet’s power and potential. In 18 years, we have grown from an Oregon-based ISP provider to a company with a fully redundant IP network that enables an array of IP voice and data services, including business VoIP. For information on how we can assist in the growth of your enterprise, contact us today.

Is EOC a Good Fit for You?

You know what they always say – time is money. Well, the reason they always say that is because it’s true. When your time is your most valuable asset, you don’t want to waste any of it waiting on inadequate connection speeds or dealing with interrupted service. If you need fast, reliable internet service at affordable prices, Ethernet over copper (EOC) might be the best business internet solution for you.
If your business is growing to the point that you’ve outgrown traditional DSL, then Ethernet over copper is an affordable way to take things to the next level. EOC can offer higher bandwidth that is easily scalable and extremely reliable. Depending upon your business location, it offers bandwidth speeds up to 45 Mbps, while remaining less expensive than a T-1.
EOC uses the existing copper telephone wires already in place, so the installation time tends to be relatively quick. Ethernet over copper combines that infrastructure already in place with new technology to bring greater reliability to your internet service. EOC uses multiple wire pairs, so if one pair goes offline, others can be accessed.
Is EOC the right choice for your business? If you need more bandwidth and faster network speeds, along with disaster recovery solutions and redundancy to protect your information assets, take a close look at EOC. Deployed on the best EOC technology available, InfoStream EOC is designed for businesses like yours.
Gain the bandwidth you need to save your business time and money. Contact us for information on pricing and availability in your area.

High Speed Internet is a Win-Win For Consumers and Retailers

There’s no doubt that access to high speed internet has changed the way we do just about everything. From streaming movies and games to working from home, the internet continues to change the way we work and play.

Now with the holiday season upon us, many will turn to shopping online rather than venturing into the maddening crowds of brick and mortar shops. And why not? Today’s breakthroughs in high speed internet enable consumers to shop smarter and faster than ever before.

In fact, according to a report from the Internet Innovation Alliance (IIA), consumer savings from online shopping increased from 12.2% to 13.5% annually. This was attributed to consumers having high speed internet access.

It’s no surprise that high speed internet access allows smart shoppers to save money. Through the internet, shoppers can do fast and easy price comparisons among competing stores, have access to greater inventory, and realize savings on car expenses since they never have to leave home.

Founding IIA co-chairman, Bruce Mehlman believes that “transitioning to next-generation networks is crucial for all Americans to be able to make the Internet part of their financial strategy.”

The average American family can save substantially on entertainment, travel, as well as services such as bill paying through using the internet. Many have come to realize this as Cyber Monday 2012 saw a big jump in online purchases over last year. According to a report in Internet Retailer.com, IBM reported online sales up 30.3% over last year.
Don’t be left behind without high speed internet.

Contact us for information on how our high speed internet solutions can get you and your business on the information highway quickly and easily.

Big Change in USF

The FCC is pondering a decision that could affect millions of consumers and businesses in rural America. That decision could be positive or negative, depending upon what your priorities are – the phone or the Internet.

A backward glance in time reveals that the telephone, in its earliest stage, was considered to be a novelty. Years later, it became a luxury for those who could afford it and had access to phone lines strung in more populated areas of the US. When the telephone’s value and subsequent need became recognized, Uncle Sam intervened to make sure that phones and phone lines were accessible to American citizens.

However, the problem for decades in providing phone service in low population areas has been the cost of expanding the phone networks to reach everyone, with profitability simply unattainable for the rural phone companies. To solve this problem, in 1996 the FCC created the Universal Service Fund (USF), which mandated that all US phone companies contribute to USF in order to subsidize those rural areas without phone service. This also helped to level the playing field among phone companies competing for the new nationwide telecom opportunities. Since then, hundreds of rural phone companies, along with their consumer and business customers, have benefited. Last year alone, over $8 billion in USF was spent on rural phone projects.

Internet broadband has experienced a similar progression, evolving from novelty to luxury to necessity. While Internet broadband is available today to the vast majority of Americans in populated areas, it’s still nonexistent in thousands of small towns. ISP’s have encountered the same financial hurdles in building their broadband networks as the phone companies experienced, where return on investment is elusive due to the limited subscriber opportunity. Consequently, an estimated 20 million Americans are still without access to Internet broadband.

So Uncle Sam, once again, is on the verge of taking a giant step to support rural areas. The FCC is now considering passing landmark legislation that will redirect those same USF funds to support the construction of data networks in rural areas. The assumption is that the need for rural phone line subsidies has been fulfilled, and now resources need to be directed to providing high speed Internet access.

In addition, the new legislation, if passed, would have more stringent regulation going forward, because the USF, from day one, has been loosely managed and, in many cases, abused, with virtually no boundaries on project costs. One widely publicized example is in the state of Washington where the phone lines of less than two dozen residents in one rural community have been subsidized to the tune of $20,000 per year from the USF.

However, this potentially huge shift in policy (and money) has many rural areas very concerned, as the very phone funds which have supported them for years may now be redirected. According to the New York Times, “The reallocation of money — and the promise it will be spent more carefully — unsettles many small and medium-size firms in rural areas that rely on the flow of subsidies. The proposed rules would also change the interconnection fees paid to companies, another concern to the rural telecommunications companies that count on the fees for a big chunk of revenue.” (NYT, “New Rules for Technology,” Feb. 23, 2011).

This proposed legislation in USF seems to be needed and therefore justifiable. Also, it’s supported by some of the largest telecom carriers in the US. But it will need to be scrutinized and both sides of the coin weighed accordingly. We don’t want it to rob Peter to pay Paul.

The Weak Link

Sophisticated IP cloud app’s work only as good as the network supporting them. The greater the reliability on cloud services, the more attention your network connection should receive.

Hosted VoIP is an excellent example. By hosted VoIP, we’re referring to an IP-cloud phone service where PBX functionality resides on an application server maintained by your service provider and is usually sold on a per-user-seat basis. Typically, with hosted phone applications, your provider also bundles the network call paths over which VoIP is carried. With the refinement of VoIP core-network technology over the past decade by the likes of Cisco, Argent, BroadSoft and Sonus,  the quality of VoIP has increased substantially. For that matter, the core of major IP networks, wherein transport, signaling and hosted functions  are provided, now operates at  levels of performance  comparable to traditional TDM networks. So why is VoIP still perceived to be inferior to traditional TDM services?

One major issue with hosted VoIP is often in the local network transport   – the Internet broadband connection –  and it’s usually the easiest part of the problem to solve. The problem may be as simple as insufficient bandwidth on your connection. With voice and data converged over the same facility, it stands to reason that your bandwidth, once used just for Internet data transport, must be increased to accommodate your hosted voice traffic. Yet, even if the bandwidth is sized correctly, there will be occasion when prioritizing voice packets will be necessary when they compete with your data packets for the same broadband pipe. A split second delay in a data download is usually more tolerable (and less noticed) than a disconnected phone call, which could occur with hosted VoIP with the exact same packet delay. Packet prioritization is usually accomplished by your LAN router.

In addition to pipe size and packet priority, the type of Internet broadband that you use will also affect your hosted VoIP quality. DSL, for example, is the most popular type of high speed Internet used by small businesses. DSL, however, is supported by a contention-based network. That means your packets, prioritized and sent successfully from you LAN over your DSL connection, still have to “contend” for transport onto the Internet once they reach the other side of the local DSL facility. If the DSL aggregation point (DSLAM) is experiencing a high load of your provider’s traffic, your packets will be delayed, and your hosted VoIP call degraded. It’s often that simple.

A chain is only as strong as its weakest link. Your network connection may be it!