Page 24 IT Administrators Guide
3.4.6 Security and Skype for SIP
Skype for SIP does not, currently, offer sRTP or other forms of voice encryption. Voice
trafc should therefore be considered in the same light as non-encrypted email and other
data trafc.
If you feel that you may be at risk of ‘man in the middle’ or spoong attacks you should
seek the advice of a specialist network security consultancy.
For more information on using Skype for SIP, please see the Skype for SIP Requirements
Guide and the Skype for SIP User Guide for Skype Manager.
3.4.7 Security summary
Use the following security procedures when deploying Skype:
˚
Before deployment, ensure you have an authentic copy of Skype. Check the
installer’s digital signature and follow the limitations in our End User License
Agreement and Terms of Service before using Skype.
˚
To ensure everyone in your company is using the same version of Skype across
your company, use the Windows Installer Package (MSI) that comes with the PC
version of Skype for Business.
˚
Instruct your users not to install their own copy of Skype on their machines and
centrally manage all Skype installations, manage version control and upgrades
and reduce the risk of malware from unauthorized, third party installers.
˚
Where it's not possible to centrally manage installation, advise your users to
download Skype only from our website at skype.com/business and ensure
that when a new version of Skype is available, it is automatically downloaded
by going to Tools > Options > Advanced and ticking the Notify me and
Automatically download and install it boxes.
˚
Keep your machines’ patches up-to-date. Many online security problems can be
traced back to improperly patched computers.
˚
Use anti-virus protection, keep the virus denitions updated and monitor alerts
and logs for potential problems.
˚
Know who you’re authorizing and don’t hesitate to block users who make
unwanted contact.
˚
Keep user proles up-to-date and remember that everything in user proles
(except email addresses) can be seen by others.
˚
Always authenticate third parties before discussing any condential business or
sensitive personal information.
˚
Remember that although Skype takes care to protect communications from
unwanted disclosure, there is a remote possibility that your computer, or that of
your contact, could have been hacked or compromised.
Comentarios a estos manuales