- Featured Columnists
- My Business
- Business Insurance
- Communications and Work Anywhere
- Customer Service
- Direct Selling
- Human Resources
- International Trade
- Legal Assistance
- Marketing, Advertising, and PR
- My Office
- Security and Fraud Protection
- Government Resources
- Selling Online
- Starting & Planning
- Travel Resources
- My Cash
- Women In Business
- Industry Solutions
- Social Media
- Calculators and Tools
- My Employee
|Share / Print / Sitemap|
Hackers Dialing Up Phone System Fraud
The Internet phone sitting on your desk may look innocent enough, but the fact that it's connected to a network leaves your company vulnerable to hackers unless you take active steps to lock it down.
Companies of all sizes are increasingly being affected by toll fraud that takes advantage of the network capabilities of digital phone systems.
Unlike analog phones that were only connected to a carrier's equipment, digital phones using Voice over Internet Protocol (VoIP) are actually small computers that, just like your laptop or other networked devices, are vulnerable to computer hackers and fraud.
In a growing number of instances, hackers are using automated tools and default passwords to identify and access networked business phone systems. Once they've accessed a phone system, the typical next step is dialing a series of calls to premium numbers, often in international destinations.
In most cases, the fraud typically remains undetected until the company's next bill arrives. The amount of each fraud incident varies, but losses in excess of $50,000 are common.
Compounding the loss, many phone companies are less willing to waive or reduce toll fraud-related costs than they might have been in the past. Many smaller or local phone service providers purchase minutes from larger carriers, and are therefore more reluctant to negotiate with customers that have experienced fraud losses.
Locking the Digital Gate
Companies have to take a number of active steps to help reduce the potential for phone system fraud:
By paying attention to your phone system's features and calling patterns, you can take advantage of your VoIP system's benefits while reducing the associated security risks.