It is feared that competitors are listening in an IP phone conversations in the research and development.
What can be done to thwart this?
A.
Implement intrusion detection.
B.
Secure all access ports.
C.
Implement secure RTP.
D.
Require passwords on all phones.