
10-Step Health Check to Avoid Toll Fraud
This is part of a series of articles showcasing how Mitel helps companies achieve their business communication objectives
How to protect your company from unwanted access and illegitimate charges
What keeps IT managers up at night? Security issues - and for good reason. When it comes to business communication systems, there are lots of reasons for concern - denial of service (DoS) attacks, eavesdropping, VoIP phishing (Vishing), and toll fraud.
Toll fraud, which is defined as any unauthorized use of a businesses telephone system and carrier services, cost victims $4.73 billion globally last year according to the Communications Fraud Control Association. It generally involves the hijacking of a phone system to make expensive international calls or calls to premium numbers overseas at several dollars a minute. The way it generally works is that the hackers dial into your system and gain access to outside lines, usually through a voice mail system or automated attendant. Using auto dialers, they call DID numbers until a voice mail or automated attendant answers, and use various techniques that help them guess the passwords for voicemail boxes and gain access. Once in, they can access outside lines and dial out to premium numbers (e.g. 900 numbers) such as psychic help lines that charge the callers over $1 a minute, and then receive a portion of these charges. The cost of these calls will then be charged to your company as if someone within your organization made the call. Most carriers have ways of spotting toll fraud and will notify the customer if they see unusual activity, but by that time, the damage has been done.
Companies of all sizes, and even the savviest organizations, can be targets. The hackers keep getting better at finding ways to break into phone systems. According to Ralph Willett, Senior Engineer, Wesley Clover Solutions, "If you have a toll free number it puts you more at risk. The more numbers you have into your system, the more voice mail systems, the more features you have may increase the risk, but this can all be controlled."
Perhaps the weakest and most vulnerable area is the business' voice mail system. Willett notes, "Voicemail is the easiest thing to attack - people don't change their voice mail or administrator's password. Hackers dial in and compromise the user's mailbox and uses this to dial out and make calls from there unless system is secured."
Jerry Sparling, VP of Customer Service and Quality, Mitel, explains, "Many customers use default passwords, which make them vulnerable to hacking. For example, it's common to use your extension number as your voice mail password, or to use the default 0000 for the administration access code to the system."
According to Sparling, "Everyone who doesn't follow best practices is at risk. Businesses in the hospitality industry are especially at risk, as many of them have older products and legacy PBXs that are 20 years old, and some of those installations didn't follow best practices."
So what can be done to prevent toll fraud? I spoke with three experts recently who shared some tips and best practices.
1. Change passwords - never use the default passwords for voice mailboxes, system administration, conference bridges, etc., and use passwords that aren't obvious or easy to guess, such as 1234. Enforce a policy of changing passwords on a regular basis, and when someone leaves the company, delete their mailboxes immediately, and block or delete all inactive mailboxes.
2. Determine what is necessary to conduct business and determine what level of restriction to apply to phones during normal and off business hours.Willett has written a detailed article posted on www.MitelForums.com on avoiding toll fraud, and suggests determining what features your business needs and what phones need them. He wrote, "Knowing what needs to be done in order to program any PBX with security in mind, a business must first determine what PBX features are required for its business environment as well as who will use these features. Each phone will have out dialing requirements based on the job function of the person using it. For example, the CEO of a company may require international calling to conduct business. This is generally not true of the lunch room phone or the copy room phone, therefore these phones should be classified differently." He recommends identifying which phones need to make long distance calls, require outbound access during off business hours, and need to make out-of-state or international calls, and then restrict these capabilities from the phones that don't require it. He adds, "When moving to the cloud, make sure whoever is doing this in the cloud is taking care of you. The same rules apply, so make sure whoever is doing the cloud understands what the restriction requirements are."
3. Programming and configuration of the system is key.It's important to preserve class of restriction and control access to trunks coming in and connecting to other trunks. Decide if users are allowed to forward calls off premises or to cell phones. Similarly, decide if you need an incoming trunk to access an outgoing trunk, and identify how to control it. For example, some users may forward their desk phone to their cell phone, or a secretary may transfer a call to the boss' home phone. Work with your carrier and with your vendor or reseller to restrict or block certain types of calls or trunk-to-trunk connections. The Canadian carrier ThinkTel suggests considering restricting call forwarding and call transfer features, especially to external numbers, and programing your phone system so that extensions can forward only to known numbers, and restrict all others, especially 901 or 90#.
4. Do a health check of your system regularly to monitor and analyze your systems. Work with your vendor or an outside consultant and go through a yearly audit to see if anything's been changed that might impact you.
5. Regularly check your voice mail and automated attendant systems, as this is the most vulnerable area that hackers can compromise and gain the ability to make external calls. Consider disabling the ability to make external calls from the automated attendant system. A misconfiguration in the auto attendant can be an easy target for the hackers, so it's important to check the system and its security parameters frequently to make sure it's working correctly. Determine whether your voice mail systems should be allowed to dial out of the PBX itself or dial international numbers, as this is where most problems occur.
6. Monitor calling patterns and review your call detail records. Check your voicemail reports, 800 number usage, monitor valid and invalid calling attempts, look for unexplained 900 number calls and chat lines. Also be on the lookout for changes in call patterns, such as a sudden increase in wrong number calls, silent hang ups, higher abandon rates, and an unusual amount of night/weekend/holiday traffic - if you get lots of calls on Friday at 2 AM, there's probably something going on.
7. Stay current - it's important to have the latest security release. Make sure your phone and voicemail systems are up-to-date and that all current patches have been installed.
8. Upgrade to a newer system that has increased security precautions built in. Older systems are much more vulnerable to being hacked, while newer systems and services were developed with security in mind. For example, Mitel's newer systems and services use 6-digit passwords for voice mail rather than the traditional 4-digit passwords, and will be increasing this to 8 digits in a new release. Mitel's latest systems also include mailbox lockout by default for new installations, which essentially locks out a user from the system if they enter an incorrect password more than three times.
9. Talk to your carrier and understand what kinds of service they have available to track and proactively notify you of unusual calling activity. It's important to be engaged with your carrier and ensure that your carrier is looking out for toll fraud.
10. Training and Education - in addition to training your technicians on how to avoid toll fraud, it's important to also educate your end users about what toll fraud is and how to prevent it. Mitel created toll fraud workshops for its partners, as well as knowledge-based articles and tools for customers, to help educate users and partners about avoiding toll fraud and ensuring security.
As Wesley Clover's Willett stated, "If you're not protected, it's a question of when, not if you'll be attacked." Mitel's Sparling adds, "The system is only as smart as the end user - if the user puts in 0000 for their password, you won't win the war. You have to be smart about how you install the PBX. The key to success is educating people." And Cam Puerzer, Director of Voice Services for RackForce notes, "Diligence and security are key. Keep vigilant."
This paper is sponsored by Mitel.
Also on UCStrategies.com in this series:
Tags
Start YourCustomized Search
SOLUTION AREA
SOLUTION PROVIDERS
- 8x8 (36) Apply 8x8 filter
- Alcatel-Lucent Enterprise (50) Apply Alcatel-Lucent Enterprise filter
- AT&T (44) Apply AT&T filter
- AudioCodes (48) Apply AudioCodes filter
- Avaya (390) Apply Avaya filter
- Cisco (566) Apply Cisco filter
- Dell (11) Apply Dell filter
- Five9 (49) Apply Five9 filter
- Fuze (39) Apply Fuze filter
- Genesys (98) Apply Genesys filter
- HP (98) Apply HP filter
- IBM (171) Apply IBM filter
- Jabra (9) Apply Jabra filter
- Logitech (56) Apply Logitech filter
- Lumen (3) Apply Lumen filter
- Masergy (50) Apply Masergy filter
- Microsoft (763) Apply Microsoft filter
- Mitel (231) Apply Mitel filter
- NEC (128) Apply NEC filter
- Nectar (58) Apply Nectar filter
- Polycom (95) Apply Polycom filter
- Ramp (37) Apply Ramp filter
- RingCentral (122) Apply RingCentral filter
- Sennheiser (18) Apply Sennheiser filter
- Slack (13) Apply Slack filter
- Tata Communications (59) Apply Tata Communications filter
- Unify (185) Apply Unify filter
- Vonage Business (80) Apply Vonage Business filter
- Yealink (8) Apply Yealink filter
- Zoom (17) Apply Zoom filter
- Acme Packet (24) Apply Acme Packet filter
- Allworx (2) Apply Allworx filter
- Arkadin (22) Apply Arkadin filter
- Aspect (34) Apply Aspect filter
- BT (25) Apply BT filter
- CaféX (8) Apply CaféX filter
- CallTower (14) Apply CallTower filter
- Clarity Connect (10) Apply Clarity Connect filter
- Continuant (1) Apply Continuant filter
- Damaka (4) Apply Damaka filter
- Dialogic (5) Apply Dialogic filter
- Dimension Data (44) Apply Dimension Data filter
- Empirix (11) Apply Empirix filter
- Enghouse Interactive (17) Apply Enghouse Interactive filter
- Inference Solutions (9) Apply Inference Solutions filter
- IntelePeer (27) Apply IntelePeer filter
- IR (11) Apply IR filter
- Jive (21) Apply Jive filter
- Kurmi Software (21) Apply Kurmi Software filter
- Lifesize (33) Apply Lifesize filter
- Lightware (3) Apply Lightware filter
- Mavenir (6) Apply Mavenir filter
- Modality Systems (8) Apply Modality Systems filter
- Momentum (36) Apply Momentum filter
- Netfortris (5) Apply Netfortris filter
- NetSapiens (6) Apply NetSapiens filter
- NewVoiceMedia (31) Apply NewVoiceMedia filter
- Nureva (26) Apply Nureva filter
- NUWAVE (5) Apply NUWAVE filter
- Orange (32) Apply Orange filter
- OVCC (8) Apply OVCC filter
- Panasonic (18) Apply Panasonic filter
- PanTerra Networks (9) Apply PanTerra Networks filter
- ScanSource (21) Apply ScanSource filter
- SIPPIO (3) Apply SIPPIO filter
- Snom (20) Apply Snom filter
- Star2Star (8) Apply Star2Star filter
- StarLeaf (12) Apply StarLeaf filter
- Tadiran Telecom (2) Apply Tadiran Telecom filter
- TekVizion (8) Apply TekVizion filter
- Unimax (7) Apply Unimax filter
- Verint (35) Apply Verint filter
- Voice4Net (2) Apply Voice4Net filter
- VOSS (84) Apply VOSS filter
- Voxbone (14) Apply Voxbone filter
- West (28) Apply West filter
- XO Communications (3) Apply XO Communications filter
- Yorktel (17) Apply Yorktel filter
- Zultys (2) Apply Zultys filter
- 3CX (8) Apply 3CX filter
- ADDASOUND (1) Apply ADDASOUND filter
- Aerohive (1) Apply Aerohive filter
- Aryaka (1) Apply Aryaka filter
- Asurion (22) Apply Asurion filter
- Avnet (7) Apply Avnet filter
- Bandwidth (5) Apply Bandwidth filter
- Calabrio (5) Apply Calabrio filter
- Consilium Software (9) Apply Consilium Software filter
- Drum (5) Apply Drum filter
- ESI (6) Apply ESI filter
- Esna (16) Apply Esna filter
- Exinda (2) Apply Exinda filter
- EZuce (3) Apply EZuce filter
- GUnify (6) Apply GUnify filter
- Highfive (4) Apply Highfive filter
- Huawei (47) Apply Huawei filter
- Imagicle (3) Apply Imagicle filter
- IPCortex (1) Apply IPCortex filter
- KnoahSoft (1) Apply KnoahSoft filter
- KOVA (1) Apply KOVA filter
- Logmein (9) Apply Logmein filter
- Metropolis Technologies (4) Apply Metropolis Technologies filter
- Mutare (2) Apply Mutare filter
- NextPlane (27) Apply NextPlane filter
- Ooma (15) Apply Ooma filter
- Patton (11) Apply Patton filter
- Radish Systems (1) Apply Radish Systems filter
- Radisys (3) Apply Radisys filter
- Shango (1) Apply Shango filter
- SMART (163) Apply SMART filter
- Stack8 (1) Apply Stack8 filter
- Swyx (1) Apply Swyx filter
- TrueConf (4) Apply TrueConf filter
- UJET (12) Apply UJET filter
- Voximplant (3) Apply Voximplant filter
CONTENT TYPE
- BC Expert Insights Market (40) Apply BC Expert Insights Market filter
- BC Expert Insights Objective - Vendor Neutral (41) Apply BC Expert Insights Objective - Vendor Neutral filter
- BC Expert Insights Planning (15) Apply BC Expert Insights Planning filter
- BC Expert Insights Solution (11) Apply BC Expert Insights Solution filter
- BC Expert Insights Vendor (79) Apply BC Expert Insights Vendor filter
- BC Expert Insights Vendor Solution (132) Apply BC Expert Insights Vendor Solution filter
- BC Expert Roundtable (121) Apply BC Expert Roundtable filter
- Bcs Webinar (0)
- Bcs Webinar Registration (0)
- Best Practice (38) Apply Best Practice filter
- Buyer Guide (14) Apply Buyer Guide filter
- Case Study (29) Apply Case Study filter
- Executive Interview (145) Apply Executive Interview filter
- Expert Roundtable (438) Apply Expert Roundtable filter
- Guest Contributions (34) Apply Guest Contributions filter
- Multimedia (38) Apply Multimedia filter
- News Analysis (2071) Apply News Analysis filter
- Newsfeed Article (1303) Apply Newsfeed Article filter
- Newsfeed Article (1) Apply Newsfeed Article filter
- Thought Leadership (21) Apply Thought Leadership filter
- Vendor Collateral (211) Apply Vendor Collateral filter
- Vendor Resource Best Practices (24) Apply Vendor Resource Best Practices filter
- Vendor Resource Buyers Guides (2) Apply Vendor Resource Buyers Guides filter
- Vendor Resource Multimedia Content (4) Apply Vendor Resource Multimedia Content filter
- Vendor Resource White Paper (4) Apply Vendor Resource White Paper filter
- Webinar (13) Apply Webinar filter
- Webinars (7) Apply Webinars filter
- White Paper (64) Apply White Paper filter
MORE FILTERS
INDUSTRY
- Banking And Investment (800) Apply Banking And Investment filter
- Education (446) Apply Education filter
- Energy And Utilities (487) Apply Energy And Utilities filter
- Finance (12) Apply Finance filter
- Government (675) Apply Government filter
- Healthcare (482) Apply Healthcare filter
- Hospitality (180) Apply Hospitality filter
- Insurance (100) Apply Insurance filter
- Manufacturing (704) Apply Manufacturing filter
- Media/Publishing (422) Apply Media/Publishing filter
- None (43) Apply None filter
- Professional Services (745) Apply Professional Services filter
- Retail & Distribution (798) Apply Retail & Distribution filter
- Technology (1611) Apply Technology filter
- Transportation (110) Apply Transportation filter
PUBLICATION DATE
Latest Articles
Latest Articles

Comments
There are currently no comments on this article.
You must be a registered user to make comments