Paranoid? Not if They’re Out to Get You… CTS Experts Build SCIFs & Secure Phones
Posted on Jan 30, 2018 in Jeff Nolte's Blog

Many in the security field focus on securing data networks against hackers and viruses, but many voice conversations require the highest level of protection too. For government agencies and contractors or enterprises that need to safeguard Intellectual Property, the ability to discuss sensitive information in full confidence that it will not be overheard or intercepted […]

Chesapeake Protects Classified and Proprietary Phone Conversations
Posted on Apr 10, 2017 in Jeff Nolte's Blog

Many in the security field focus on hardening data networks against hackers and viruses, but voice conversations often require the highest level of protection too. For government agencies and contractors, the need is obvious: having the ability to discuss classified information in full confidence that it will not be overheard or intercepted. Chesapeake offers several […]

CTS Joins Cyber Security Association of MD to Promote SCIF Design-Build & Secure Phones Portfolio
Posted on Mar 30, 2017 in Jeff Nolte's Blog

What is the Cybersecurity Association of Maryland? This statewide, nonprofit formed to identify Maryland’s cybersecurity product and service companies and facilitate their introduction to businesses, government entities, nonprofit organizations and academic institutions seeking cybersecurity solutions.

Protect Your VoIP System from Hack Attacks
Posted on Dec 30, 2016 in Jeff Nolte's Blog

Today, hackers continue to wreak havoc on traditional phone systems, but with the popularity of VoIP phone systems, hackers have a new playground. That’s because the Internet and IP-based technologies suffer from a growing list of security vulnerabilities, offering hackers a variety of new attack vectors. Since an IP phone system typically shares the same […]

Simple Passwords Still Leaving Too Many Phone Systems Exposed
Posted on Oct 31, 2016 in Jeff Nolte's Blog

Phone system hacking can leave you with a huge long distance bill and provide criminals with access to other systems on your network. As one of our clients found out recently, the use of an easy-to-guess password can wreak havoc. Here are a few tips on devising effective passwords:

Simple Steps to Thwart Phone Hacking
Posted on Nov 13, 2015 in Jeff Nolte's Blog

Phone hacking or “phreaking” costs businesses billions of dollars. Even worse – many carriers expect you to pay the bill! Decades ago, hackers were able to access the telephone network using a series of tones input via a “blue box” to fool the system into allowing them to make free long distance calls. Now hackers […]