Skype - 2.0 Guía de usuario Pagina 24

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 30
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 23
Page 24 IT Administrators Guide
3.4.6 Security and Skype for SIP
Skype for SIP does not, currently, offer sRTP or other forms of voice encryption. Voice
trafc should therefore be considered in the same light as non-encrypted email and other
data trafc.
If you feel that you may be at risk of ‘man in the middle’ or spoong attacks you should
seek the advice of a specialist network security consultancy.
For more information on using Skype for SIP, please see the Skype for SIP Requirements
Guide and the Skype for SIP User Guide for Skype Manager.
3.4.7 Security summary
Use the following security procedures when deploying Skype:
˚
Before deployment, ensure you have an authentic copy of Skype. Check the
installer’s digital signature and follow the limitations in our End User License
Agreement and Terms of Service before using Skype.
˚
To ensure everyone in your company is using the same version of Skype across
your company, use the Windows Installer Package (MSI) that comes with the PC
version of Skype for Business.
˚
Instruct your users not to install their own copy of Skype on their machines and
centrally manage all Skype installations, manage version control and upgrades
and reduce the risk of malware from unauthorized, third party installers.
˚
Where it's not possible to centrally manage installation, advise your users to
download Skype only from our website at skype.com/business and ensure
that when a new version of Skype is available, it is automatically downloaded
by going to Tools > Options > Advanced and ticking the Notify me and
Automatically download and install it boxes.
˚
Keep your machines’ patches up-to-date. Many online security problems can be
traced back to improperly patched computers.
˚
Use anti-virus protection, keep the virus denitions updated and monitor alerts
and logs for potential problems.
˚
Know who you’re authorizing and dont hesitate to block users who make
unwanted contact.
˚
Keep user proles up-to-date and remember that everything in user proles
(except email addresses) can be seen by others.
˚
Always authenticate third parties before discussing any condential business or
sensitive personal information.
˚
Remember that although Skype takes care to protect communications from
unwanted disclosure, there is a remote possibility that your computer, or that of
your contact, could have been hacked or compromised.
Vista de pagina 23
1 2 ... 19 20 21 22 23 24 25 26 27 28 29 30

Comentarios a estos manuales

Sin comentarios