Datasharp UK

Protect your Business Phone from Fraud

Voice

Hacking – a growing problem

Phone hacking is becoming an increasingly common practice. It occurs when criminals hack into business phone systems and make unauthorised calls to Premium Rate and International numbers.  These attacks can result in extremely high costs if your phone system is unmonitored.  They can also leave your business exposed and vulnerable to further attacks.

And, with the added threat of Social Engineering (whereby criminals attack voicemail boxes to place call) the quantity and ferocity of attacks is only going to increase.

8 simple steps to prevent business phone hacking

With businesses being liable for the cost of any fraudulent calls, we recommend you take the following preventative measures:

  1. Make sure all employees change their voicemail password from the default manufacturer settings.
  2. Change passwords from time to time, especially when employees leave the organisation.
  3. Use strong passwords – at least 8 characters long, containing both upper and lower-case letters, numbers and special symbols – to make them less easy to guess.
  4. Delete unused extensions and voicemails.
  5. Make sure your system is programmed with Call Barring for non-essential Premium Rate and International numbers.
  6. Limit call forwarding to known or internal numbers only.
  7. Regularly review your call history and monitor call usage of individual users.
  8. Use restrictive firewall rules to ensure they only respond to authorised clients within a given IP space.

Datasharp’s added extras

There are numerous methods you can use to limit the chances of being hacked.  We recommend to our customer that they also:

  1. Register for our free real time toll fraud detection product ‘LineGuard’ which monitors all your accounts in real time, to quickly identify and take action to reduce the impact of hacking.
  2. Set up a free “E-Alert” facility to alert you of unusual call patterns.
  3. Install a low-cost Voice Firewall.
  4. Speak to our IT experts about RFC2827 Network Ingress Filtering to combat IP Source Address Spoofing.

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Share This Post