WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

Size: px
Start display at page:

Download "WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts"

Transcription

1 WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

2 OUTLINE Overview...3 What is Telecom Fraud...4 Different Types of Fraud...5 A Look at the Top What is a PBX PBX Hacking A Big Problem...11 PBX Hacking How is it Done...13 It Can Happen to You How to Prevent Summary...17 Page 2 Outline

3 OVERVIEW Telecommunications fraud continues to be a big problem in the industry today. Advancements in technology have made life easier and more convenient for most people today, but not without a price. These advancements not only bring innovation for good, but they also bring about increasingly sophisticated practices in which fraudsters can infiltrate a company. Communication Service providers are faced with enough challenges from competition, declining ARPU, lower margins and other growth-related challenges. While paying more attention to these other areas, it can leave them vulnerable to unsuspecting attacks. With fraud continuing to be a big problem, fraud management has evolved from a defensive and reactive strategy focused on prevention to a more proactive, revenue generating and innovative approach. Goals have shifted from simply detecting fraud to achieving higher customer satisfaction and creating new revenue streams. In this e-book, we will not only outline the top types of fraud effecting the industry today, but we will also recommend best practices to help fight fraud and try to prevent it before it occurs. Page 3 Overview

4 WHAT IS TELECOM FRAUD Telecommunication fraud is defined as the theft of telecommunication services or the use of telecommunication service to commit other forms of fraud. This type of fraud happens on a daily basis, sometimes without anyone knowing until the damage has already been done. Fraud primarily occurs to a company with a weak defense system. Billing systems and network vulnerabilities are easily exploited to gain access, when if proper procedures were put in place, could have easily been prevented. With new voice technologies becoming more attractive, improperly installed systems can be infiltrated easily and put a small company out of business in mere minutes. For example, a technology such as Voice over Internet Protocol (VoIP) uses the Internet to make and receive phone calls, and not infrastructure owned by the traditional telephone networks. Because of it s affordability, some businesses try to install their own PBX systems using an under qualified individual which can result in security leaks and cracks that can be easily exploited. Page 4 What is Telecom Fraud

5 DIFFERENT TYPES OF FRAUD According to the Communications Fraud Control Association (CFCA) 2011 Global Fraud Loss Survey, the CFCA estimates that Telecom Fraud costs the industry over $40 Billion(USD) annually. This equates to almost 2% of telecom revenues that cannot be reported on a companies income statement. The survey also outlines the Top 5 Fraud Types as follows: 1. PBX/Voice mail systems $4.96B 2. Subscription/Identity(ID)Theft $4.32B 3. International Revenue Share Fraud (IRSF) $3.84B 4. By-Pass Fraud $2.88B 5. Credit Card Fraud $2.40B For more information on this survey, please visit: With PBX Fraud being the most costly, we ll dig a little deeper into the types and issues Communications Service Providers face. But before we go into detail pertaining to PBX Fraud, let s take a look at some of the other types of fraud that made the top 5 list and are top of mind for revenue assurance managers around the world. Page 5 Different Types of Fraud

6 A LOOK AT THE TOP 5 SUBSCRIPTION IDENTITY THEFT Subscription ID Theft occurs when a subscriber uses false identification or uses an unsuspecting victims ID to obtain service. The Internet is a virtual goldmine of personal information that fraudsters can easily access and use to create false identities. Once these identities are created, they can use it to obtain all kinds of products and services. Communication Service Providers should ensure they have a system in place capable of detecting and combating fraud. Some service providers currently maintain their own fraud databases. Others have begun implementing personal verification and prepaid systems. Page 6 A Look at the Top 5 Subscription Identity Theft

7 A LOOK AT THE TOP 5 INTERNATIONAL REVENUE SHARE FRAUD International Revenue Share Fraud (IRSF) occurs when hackers obtain Subscriber Identity Management numbers (SIMs) from a Communication Service Providers home network and connect them to gain international roaming status to begin placing outgoing international calls. The opportunity for fraudsters to exploit some countries high termination rates, or inflate traffic into other high value numbers with the intention of sharing any revenue generated from this activity, has been a problem for CSP s for some years now. Many of these opportunities are created through number aggregator websites who openly advertise revenue share offerings to many countries, and invite visitors to their websites to register on-line and immediately start generating revenue. Fraudsters are constantly searching for a weak link. Service Providers should ensure that they have sufficiently secure controls in place to prevent any outsiders from using their network as an enabler for Revenue Share Fraud. Page 7 A Look at the Top 5 International Revenue Share Fraud

8 A LOOK AT THE TOP 5 BY-PASS FRAUD By-Pass Fraud occurs when in-bound off-net traffic is disguised as on-net traffic (By-Pass) to avoid high costs of terminating traffic. Most By-Pass operations are performed on a large scale utilizing advanced SIM- Boxes that can be managed from anywhere. Content Service Providers attacked can experience significant losses in their in-bound interconnect revenues. Service providers should constantly monitor in-bound and on-net traffic in order to detect any indications associated with By-Pass Fraud, such as suspected calling numbers or suspicious call pattern tendencies. Page 8 A Look at the Top 5 By-Pass Fraud

9 A LOOK AT THE TOP 5 CREDIT CARD FRAUD Credit Card Fraud occurs when someone uses a credit card as a fraudulent source of funds in a transaction to obtain goods without paying or to obtain unauthorized funds from an account. Today, many Communications Service Providers accept credit card and e-payments for services. A fraudster will try to make payment for those services using a third party credit card number. When the original card holder receives their bill and notices the charges, they ll typically dispute the charges and refuse to pay. Service providers should make sure safeguards are in place that limit the amount of payment which can be made through a credit card, as well as monitor the payments of multiple bills using the same credit card number. Page 9 A Look at the Top 5 Credit Card Fraud

10 WHAT IS A PBX? PBX (Private Branch Exchange) systems started out as an internal company switchboards where operators manually directed calls from one person to the next. By the time the 80 s rolled around, manual switchboards had been thrown aside, replaced with automatic switchboards that could route the call by itself. Fast forward to today, where PBX technology is taking on a whole new realm, the Internet world. Instead of routing calls through old switchboards and circuits, today s solutions use Internet protocol to exchange information. This new world also enables users to work from virtually anywhere while still experiencing the full benefit of their networks PBX features. But, as we ve stated previously, there s sometimes a cost associated with advancements in technology. For every worker able to telecommute from the beach, you can bet there s some hacker on that beach right next to him trying to see how they can gain access to that same network. Page 10 What is a PBX?

11 PBX HACKING A BIG PROBLEM PBX hacking the act of breaking into and accessing a company s PBX system and selling long distance/international telephone time to third parties remains one of the leading types of fraud around the world. It s also nothing new, having first been reported in Since then, it has consistently been one of the main computer crimes reported to Fraud investigators all over the world. Telephone hackers can take over insecure PBX systems to make international and long distance calls, listen to voice mail or monitor conversations. The main economic reason fraudsters hack PBX systems is to gain access to the trunk lines after which they begin generating as many calls as possible to international premium rate numbers that they own off which the criminal collects 90% revenue. Many businesses are unaware that they are responsible for all calls made from their phone system, including any fraudulent calls. More so, victims of hacked PBX systems are typically unaware of any unauthorized use and unwittingly allow the hackers to sell the use of their telephone system to others or, far worse give the hackers the opportunity to maliciously reprogram the system. Page 11 PBX Hacking A Big Problem

12 PBX HACKING WHY SHOULD I CARE? There are many issues and headaches surrounding PBX Fraud, but the main reason Communication Service Providers and businesses in general need to realize the importance of preventing PBX attacks is economics. With close to $5B in revenue lost to PBX Hacking, it s surprising that some companies still choose to not put effective counter measures in place. With PBX technology having been around for so long, phone hackers (also known as phreakers) have had decades to look for potential vulnerabilities to exploit. Couple that with the fact that there are a relatively small number of companies in the PBX equipment arena, an attacker that takes the time to learn two or three brands of PBX systems can have critical knowledge to attack over 70% of the possible targets. While new data and Internet products are being touted as the next big thing, often receiving big budgets and headcount, PBX technology is often viewed as only needing regular maintenance to keep it running. This lack of attention and focus can enable hackers to have a field day on unsuspecting victims. Page 12 PBX Hacking Why Should I Care?

13 HOW IS IT DONE? Phreakers can identify target systems either by searching phone directories for phone numbers of organizations that use a PBX, or by using a war dialer program on a computer that walks through sequences of phone numbers. Most PBXs today are software driven. When not properly configured, hackers can gain access to the system remotely by accessing remote features intended to make the users life easier and more efficient. Those remote features include: Voice Mail Some voic systems can be accessed remotely and programmed to make outbound voice calls. Hackers make use of this feature to forward calls to a phantom mail box that will give a dial tone, allowing them to make calls from anywhere, on the hacked business account. Hackers can also gain access to a mailbox to listen to messages, change greetings or delete messages entirely. Maintenance Port PBX administrators usually manage their PBX system via a maintenance port, by connecting remotely into their system. By controlling this PBX maintenance port, hackers can change the call routing configuration, passwords and can delete or add extensions or shut down a PBX, all of which can have a negative impact on business operations. DISA DISA is a feature that enables remote users to access an outside line via a PBX with authorization codes. This is a very useful feature for employees who are on the road a lot or who frequently make long distance calls or need to access an international call conference after business hours. By gaining access to this, hackers can access an outside line and make calls at the cost of the business. Page 13 How is It Done?

14 IT CAN HAPPEN TO YOU Typically, phreakers are highly skilled phone engineers that can strike anywhere at anytime. Most attacks typically occur after normal business hours or on holidays when intrusions are least likely to be detected. In 2011, a quartet of hackers based in the Philippines were arrested for hacking into AT&T and other telecommunications companies for millions, which they channeled to their own bank accounts and to accounts associated with a terrorist organization. Working from the Philippines during the day, these phreakers would dial numbers of US businesses after hours to attempt to gain access to phone systems through unused extensions on the system or other extensions with default passwords in place. Using a brute force approach where they systematically worked through phone extensions and pass codes with the aid of dialing software, the phreakers would gain access to extensions, change their passwords and then use the hacked extension to make outbound calls using the DISA number. While many hackers do it for the thrill of it, these phreakers conducted phone fraud on an epic level, turning exploited PBXs into their very own long-distance service. They also used their access to place calls to high-rate international premium-rate services the equivalent of 900 numbers in the US, where customers are assessed a per-minute fee on their phone bill for services. At least some of the revenue generated from the calls was reported to be $2 million through AT&T alone. Page 14 It Can Happen to You

15 HOW TO PREVENT IT Putting secure measures in place to fully secure your system is the first step to prevent hackers from gaining access and limit the potential damage and revenue implications that could effect your business as a result. The following are some recommended industry best practice guidelines that, if followed could help reduce the risk of telephone hacking. Knowledge and Awareness Knowledge is power. Everyone in your organization should understand and recognize the dangers and implications telephone hacking can have on your business. Key Measures should be taken to: Educate staff on security procedures and ensure they understand the potential ramifications Ensure procedures s are in place in case of any attack or red flags Familiarize yourself with your business call patterns and monitor them regularly The more you and your employees know, the more empowered you ll be if and when an attack does occur. Page 15 How to Prevent It

16 HOW TO PREVENT IT GENERAL SECURITY Security is of the utmost importance in all areas of business. Hackers are armed with the same information you are, and typically, are one step ahead. Ensuring that your system is secure can make the difference between a good day and being out of business. Passwords they hold the key to your castle and should be impenetrable Restrict use of default system codes and enforce rules to ensure passwords are secure Enforce password expiration dates to regulate frequent change Passwords should be lengthy, random and include characters, numbers and letters Know Your Business attention to detail can make you proactively detect any irregularities or issues Remove any inactive mailboxes or extensions Monitor your system frequently to easily identify irregularities and look for suspicious activity Evaluate your current settings and disable any features that are not in use Restricted Access keep certain passwords and features under a tight leash to ensure no issues arise Disable the external call forwarding feature in voice mail, unless it is absolutely required Restrict access to international or long distance destinations to which your company does not require access. Restrictions should include calls Limit the DISA access number and authorization codes to only employees that have a real need for such a feature Page 16 How to Prevent It General Security

17 SUMMARY Telecom Fraud is a big business. It can not only put companies out of business, it can enrich and enable criminals to inflict much more than monetary harm. The better educated and informed you are, the better you will be protected from all the risks. By staying on top of the current threats and security measures, you can secure your network and ensure that your business is not taken by surprise. Phone Hackers look for the easiest targets and tend to not focus on systems with properly implemented security in place. As with many crimes of opportunity some hackers may be lazy and look for an easier target once they realize they can t penetrate a system. Since their end goal is to find any vulnerable system that would allow them to make international calls rather than access data, they will have no reason to invest their time in cracking your security. Until businesses realize the seriousness of security threats and invest the time to make sure their telecom services are safe and secure, telecommunications fraud will continue to be a big business that continues to put people out of business. Page 17 Summary

18 INTRODUCING NEUSTAR COMMUNICATIONS ANALYTICS Neustar provides expert insight and analytics that allow businesses to take their data and create valuable information assets that can be specifically used to improve business efficiency, minimize risk and drive revenues. Often one fraud problem is linked to other issues of fraud, revenue offer and cost management. Content Service Providers need to be sure that all systems are in sync and shared amongst functional groups. Neustar s Communications Analytics Services are a completely managed business assurance solution that looks across your entire organization to identify problems and implement results. Our experts can do the work for you, lightening your work load and saving you money in the process that can pay for the solution itself in months. PBX fraud prevention is only one part of a suite of integrated solutions offered by Neustar. The full service suite includes: Revenue Assurance, Risk Management, Margin Management and Sales Performance Management. All in a completely managed service offering. Let us help you find the right combination of solutions for your business. Page 18 Introducing Neustar Communications Analytics

19 NEUSTAR COMMUNICATION ANALYTICS For more information, visit us on the web at: Page 19 Neustar Communication Analytics

20 V1-05/09/

PBX Fraud Information

PBX Fraud Information PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks

More information

PBX Fraud Educational Information for PBX Customers

PBX Fraud Educational Information for PBX Customers PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and

More information

TOLL FRAUD POLICIES AND PREVENTION

TOLL FRAUD POLICIES AND PREVENTION TOLL FRAUD POLICIES AND PREVENTION What is Toll Fraud? Toll Fraud is the theft of long-distance service. It s the unauthorized use of phone lines, services or equipment to make long distance calls. When

More information

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

International Dialing and Roaming: Preventing Fraud and Revenue Leakage page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related

More information

PBX Security in the VoIP environment

PBX Security in the VoIP environment PBX Security in the VoIP environment Defending against telephony fraud Executive Summary In today s communications environment a voice network is just as likely to come under attack as a data network.

More information

Concept Note. powering the ROC. PBX Hacking. www.subex.com

Concept Note. powering the ROC. PBX Hacking. www.subex.com Concept Note powering the ROC PBX Hacking Introduction A PABX/PBX (Private (Automatic) Branch exchange) is telephone equipment that is installed on corporate premises to provide a number of telephone extensions

More information

Preventing Telephone Fraud

Preventing Telephone Fraud We can help you to detect, and then prevent, many different types of Telephone Fraud More than 200 types of telecom fraud exist, and the methods of intrusion and theft of services are becoming ever-more

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

White Paper Voice Fraud Monitoring

White Paper Voice Fraud Monitoring White Paper Voice Fraud Monitoring Executive Summary Voice Fraud is a growing concern in this country, with 98% of businesses which have experienced hacking also victims of Voice Fraud. The cost of the

More information

CCT Telecomm offers the following tips to ensure your protection from phone fraud at your home or business:

CCT Telecomm offers the following tips to ensure your protection from phone fraud at your home or business: Fraud FAQs Telephone and Internet fraud happens every day. It rings up billions in fraudulent phone charges and victimizes millions of people a year. It can happen in public, in your home, at your business

More information

Anti Fraud Services. Associate Member of..

Anti Fraud Services. Associate Member of.. Anti Fraud Services Associate Member of.. Fraud Context: Global Risk Fraud losses as a percentage of global telecom revenues were estimated at 2.09% in 2013 by the Communications Fraud Control Association

More information

6 Steps to SIP trunking security. How securing your network secures your phone lines.

6 Steps to SIP trunking security. How securing your network secures your phone lines. 6 Steps to SIP trunking security How securing your network secures your phone lines. The myths about SIP trunking can be misleading. There are stories that SIP has set off a cyber crime wave of corporate

More information

VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ======

VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ====== VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ====== Table of Contents Introduction to VoIP Theft of Service... 2 Meet Our Expert Phone Power... 2 The Anatomy of International Revenue Sharing Fraud...

More information

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER How to ensure a cloud-based phone system is secure. BEFORE SELECTING A CLOUD PHONE SYSTEM, YOU SHOULD CONSIDER: DATA PROTECTION.

More information

Business Telephony Security

Business Telephony Security Business Telephony Security Toll Fraud - What is it? Toll Fraud or Phreaking is the process of illegal hacking of telecoms systems for the purpose of exploiting phone numbers to profit from premium rate

More information

TELECOM FRAUD CALL SCENARIOS

TELECOM FRAUD CALL SCENARIOS TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple

More information

8335 Guilford Road Suite H Columbia MD 21046 www.acctelecom.com 410.995.0101 888.226.2216

8335 Guilford Road Suite H Columbia MD 21046 www.acctelecom.com 410.995.0101 888.226.2216 8335 Guilford Road Suite H Columbia MD 21046 www.acctelecom.com 410.995.0101 888.226.2216 VoIP s Group: Auto Attendant Customer Portal Top Level Auto Attendant (Always On) Multiple Top Level Auto Attendants

More information

How To Protect A Call Center From Fraud

How To Protect A Call Center From Fraud White Paper Benefits of Telecom Analytics & Fraud Detection for Call Centers Yaniv Rofé Humbug Telecom Labs, Ltd. November, 2011 OVERVIEW Managing telecom fraud is an increasingly important priority for

More information

Fighting Online Fraud

Fighting Online Fraud White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant

More information

Recommendations for secure deployment of an IP-PBX

Recommendations for secure deployment of an IP-PBX Internet Telephony Services Providers Association Recommendations for secure deployment of an IP-PBX Version 2 November 2013 Contact: admin@itspa.org.uk Contents Introduction... 3 Health Warning!... 3

More information

Hosted Business Class VoIP Features

Hosted Business Class VoIP Features Hosted Business Class VoIP s Customer Portal Web based user interface that allows users to configure their PBX, create call queues and groups, view call detail records and billing information, listen to

More information

With 360 Cloud VoIP, your company will benefit from more advanced features:

With 360 Cloud VoIP, your company will benefit from more advanced features: Voice over IP (VoIP) has emerged as the new leader in cost-effective standards based communications. 360 Cloud VoIP enables customers have the benefits of an Enterprise PBX for a fraction of the cost of

More information

Hackers: Detection and Prevention

Hackers: Detection and Prevention Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik

More information

BP_UserGuide_1113. Business Phone User Guide

BP_UserGuide_1113. Business Phone User Guide BP_UserGuide_1113 Business Phone User Guide Contents Welcome to Shaw Business Phone 2 Voicemail 6 Call Forward 7 Call Forward Busy 8 Call Forward No Answer 9 Call Waiting 10 Multi-line Hunting 12 Call

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

INTRODUCTION TO VOIP FRAUD

INTRODUCTION TO VOIP FRAUD INTRODUCTION TO VOIP FRAUD Contents Introduction to VoIP Fraud... 2 What constitutes VoIP Fraud?... 2 Who does VoIP fraud affect?... 2 Where does VoIP fraud come from?... 3 How big of a problem is VoIP

More information

Position Paper Toll fraud prevention Lock thieves out of your phone system

Position Paper Toll fraud prevention Lock thieves out of your phone system Position Paper Toll fraud prevention Lock thieves out of your phone system They re called hackers, phone phreaks, dump bin divers and shoulder surfers. They sell information between themselves and they

More information

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Authored by: Dr. Ian Howells Dr. Volkmar Scharf-Katz Padraig Stapleton 1 TABLE

More information

Auto Attendants. Call Management

Auto Attendants. Call Management Auto Attendants Customer Portal Top Level Auto Attendant (Always On) Multiple Top Level Auto Attendants (Always on) Top Level Auto Attendant (Time Based) Sub-Level Auto Attendants Web based user interface

More information

Date 10/04/2012 TB Number TB - 12004 VoIP Security Threat Reminder

Date 10/04/2012 TB Number TB - 12004 VoIP Security Threat Reminder VOIP SECURITY THREAT REMINDER Bulletin Authorisation Detail Author Andrew Kenyon Authorisation Wilf Wood Date 10/04/2012 TB Number TB - 12004 Description VoIP Security Threat Reminder Summary Please use

More information

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected

More information

Feature Reference. Features: Call Forwarding Call Waiting Conference Calling Outbound Caller ID Block Last Call Return VoiceMail

Feature Reference. Features: Call Forwarding Call Waiting Conference Calling Outbound Caller ID Block Last Call Return VoiceMail Feature Reference This document will provide you with information on and how to use the following features of your phone service with Standard Broadband. Features: Call Forwarding Call Waiting Conference

More information

AUTO ATTENDANTS CALL MANAGEMENT

AUTO ATTENDANTS CALL MANAGEMENT AUTO ATTENDANTS Customer Portal Top Level Auto Attendant (Always On) Multiple Top Level Auto Attendants (Always on) Top Level Auto Attendant (Time Based) Sub-Level Auto Attendants Web based user interface

More information

BP_UserGuide_0113. Business Phone User Guide

BP_UserGuide_0113. Business Phone User Guide BP_UserGuide_0113 Business Phone User Guide Contents Welcome to Shaw Business Phone 2 Voicemail 6 Call Forward 7 Call Forward Busy 8 Call Forward No Answer 9 Call Waiting 10 Multi-line Hunting 12 Call

More information

Enterprise Voice Network Security Solutions. A Corporate Whitepaper by SecureLogix Corporation

Enterprise Voice Network Security Solutions. A Corporate Whitepaper by SecureLogix Corporation Enterprise Voice Network Security Solutions A Corporate Whitepaper by SecureLogix Corporation Contents Introduction 1 1. Voice Network Security Threats 1 Toll Fraud... 1 Social Engineering Attacks... 2

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

Hosted VoIP Feature Set

Hosted VoIP Feature Set Hosted VoIP Set AUTO ATTENDANTS Customer Portal Top Level Auto Attendant (Always On) Multiple Top Level Auto Attendants (Always on) Top Level Auto Attendant (Time Based) Sub-Level Auto Attendants Web based

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Communications Fraud Control Association. 2013 Global Fraud Loss Survey

Communications Fraud Control Association. 2013 Global Fraud Loss Survey Communications Fraud Control Association 2013 Global Fraud Loss Survey Overview Survey Type & Methodology Executive Summary Results Fraud Management Snapshot Top Fraud Methods & Types Top Countries Where

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Vishing (and SMiShing ) Countermeasures

Vishing (and SMiShing ) Countermeasures Vishing (and SMiShing ) Countermeasures Fraud Investigation & Education FIS www.fisglobal.com Vishing What is it? Vishing also called (Voice Phishing) is the voice counterpart to the phishing scheme. Instead

More information

IPitomy User Guide Business Phones Conferencing Voice Mail

IPitomy User Guide Business Phones Conferencing Voice Mail IPitomy User Guide Business Phones Conferencing Voice Mail Using Your Telephone Your new telephone is a state of the art IP Telephone instrument. It is manufactured by Aastra, the manufacturers of Northern

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

International Carriers

International Carriers International Carriers combatting by-pass fraud with Orange expertise and services Pierre Paufique December 2014 Anti-Fraud Interconnect Roaming & Supervision of Transactions 2014 why we should fight by-pass

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

NICC ND 1438 V1.1.1 (2016-03)

NICC ND 1438 V1.1.1 (2016-03) NICC Document Voluntary Code of Practice Mitigating Theft of Service from End User Voice over IP Communications Systems Michael Faraday House, Six Hills Way, Stevenage SG1 2AY Tel.: +44(0) 20 7036 3636

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Battling illegal call operations with Fraud Management Systems

Battling illegal call operations with Fraud Management Systems Battling illegal call operations with Fraud Management Systems 02/12 Battling illegal call operations with Fraud Management Systems Executive summary Contents 02 Executive summary 03 Compare: ratio of

More information

Welcome to Cogeco Business Digital Phone Service

Welcome to Cogeco Business Digital Phone Service Welcome Welcome to Cogeco Business Digital Phone Service Congratulations on choosing Cogeco Business Digital Phone Service. 1 Your decision to subscribe to our digital quality phone service is a smart

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

Device SIP Trunking Administrator Manual

Device SIP Trunking Administrator Manual Table of Contents Device SIP Trunking Administrator Manual Version 20090401 Table of Contents... 1 Your SIP Trunking Service... 2 Terminology and Definitions... 2 PBX, IP-PBX or Key System... 2 Multi-port

More information

ITSPA. Recommendations for secure deployment of an IP-PBX. Public. Node4 Limited Richard Buxton 31/05/2011

ITSPA. Recommendations for secure deployment of an IP-PBX. Public. Node4 Limited Richard Buxton 31/05/2011 ITSPA Recommendations for secure deployment of an IP-PBX Public Node4 Limited Richard Buxton 31/05/2011 Recommendations for secure deployment of an IP-PBX Node4 are members of the Internet Telephony Service

More information

The Business Value of Call Accounting

The Business Value of Call Accounting WHITE PAPER The Business Value of Call Accounting How Call Accounting Software Helps Reduce Business Expenses and Improve Productivity Introduction Call accounting software has been available for more

More information

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard The Impact of Wireless LAN Technology on to the PCI Data Security Standard 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs and PCI Retailers today use computers

More information

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 What is a firewall? Firewalls are programs that were designed to protect computers from unwanted attacks and intrusions. Wikipedia

More information

Telephone User Guide 1

Telephone User Guide 1 Telephone User Guide 1 Introduction The NextPBX is a virtual phone system designed for small businesses and entrepreneurs. It provides you with your own private local or toll free number. This one number

More information

HELPFUL HINTS FOR VOIP PHONES

HELPFUL HINTS FOR VOIP PHONES HELPFUL HINTS FOR VOIP PHONES TO LEAVE A MESSAGE IN MAILBOX WITHOUT CALLING THE NUMBER ACCESS THE LINE (GET DIAL TONE) - PRESS STAR DIAL 5 DIGIT NUMBER TO TRANSFER A CALL WITHOUT ANNOUNCING WHOSE CALLING

More information

Voice Network Management Best Practices

Voice Network Management Best Practices Voice Network Management Best Practices A white paper from SecureLogix Corporation Introduction Traditionally, voice networks have been managed from the switch room, with limited enterprise-wide visibility.

More information

Voice Over IP Technology. Zlatko Jovanovic. International Academy of Design and Technology

Voice Over IP Technology. Zlatko Jovanovic. International Academy of Design and Technology Voice Over IP Technology Zlatko Jovanovic International Academy of Design and Technology Abstract New technologies often give us new, different way of doing things, than we are used to. One of the new

More information

JUNCTION CONNECTIONS SERVICES AGREEMENT WHOLESALE SIP TRUNKING & CALLING CARD - January 25, 2011

JUNCTION CONNECTIONS SERVICES AGREEMENT WHOLESALE SIP TRUNKING & CALLING CARD - January 25, 2011 JUNCTION CONNECTIONS SERVICES AGREEMENT WHOLESALE SIP TRUNKING & CALLING CARD - January 25, 2011 The customer shall not use this service as their sole call termination service, and shall be advised to

More information

Franchise Data Compromise Trends and Cardholder. December, 2010

Franchise Data Compromise Trends and Cardholder. December, 2010 Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee

More information

The question is what kind of VoIP do you want? What are the tradeoffs today?

The question is what kind of VoIP do you want? What are the tradeoffs today? Selecting a Voice Solution Hosted VoIP vs. PBX VoIP Contents Introduction The Traditional Solution Why VoIP? The Primary Tradeoffs Today Hosted VoIP Today s PBX Latest Features of VoIP Managing Costs What

More information

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta. Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks

More information

How to Avoid the 10 BIGGEST MISTAKES. in Voice Application Development

How to Avoid the 10 BIGGEST MISTAKES. in Voice Application Development How to Avoid the 10 BIGGEST MISTAKES in Voice Application Development Are you building the next generation mobile app that provides users anytime, anywhere voice and messaging communication? Maybe you

More information

Grandstream Networks, Inc.

Grandstream Networks, Inc. Grandstream Networks, Inc. UCM6100 Basic Configuration Guide Grandstream Networks, Inc. www.grandstream.com TABLE OF CONTENTS OVERIEW... 4 SETUP GUIDE SCENARIO... 4 QUICK INSTALLATION... 5 Connecting the

More information

Your Phone System: Is it Time to Upgrade or Replace It?

Your Phone System: Is it Time to Upgrade or Replace It? Your Phone System: Is it Time to Upgrade or Replace It? Solving your phone problems is more complicated than just ordering some phone lines and plugging in new equipment. You have to understand the total

More information

Cloud9 Hosted PBX Feature Guide

Cloud9 Hosted PBX Feature Guide Meeting Your Business Needs We understand that your business needs a comprehensive phone system to compete in today's business environment. With Telemaxx, you don't have to compromise, and in most instances

More information

Best Practices Top 10: Keep your e-marketing safe from threats

Best Practices Top 10: Keep your e-marketing safe from threats Best Practices Top 10: Keep your e-marketing safe from threats Months of work on a marketing campaign can go down the drain in a matter of minutes thanks to an unforeseen vulnerability on your campaign

More information

VOIP Attacks On The Rise

VOIP Attacks On The Rise VOIP Attacks On The Rise Voice over IP (VoIP) infrastructure has become more susceptible to cyber-attack due to the proliferation of both its use and the tools that can be used for malicious purposes.

More information

Take back control of your business communications.

Take back control of your business communications. Take back control of your business communications. JOIN THE XO EVOLUTION XOptions Flex the business communications bundle Break free from the oppression of multiple communications vendors. Business communications

More information

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer

More information

What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya

What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya What Makes Good Fraud Management Software? 9 Questions for Tal Eisner of cvidya An Article by Tal Eisner, Senior Director Product Strategy at cvidya, January 2013. Tal Eisner Senior Director Product Strategy

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

Telecommunications Fraud Organized approaches to fight it

Telecommunications Fraud Organized approaches to fight it Telecommunications Fraud Organized approaches to fight it Presentation for FIRST Technical Colloquium February 7. 2000 By Security Supervisor Keld Frimann Nielsen Tele Denmark Agenda Telecommunications

More information

NGT Hosted Digital Voice. User Guide

NGT Hosted Digital Voice. User Guide NGT Hosted Digital Voice User Guide December 2009 Getting Started Making Calls Using Your NGT Hosted Digital Voice service Domestic Dial as you normally would. You can also reference your local telephone

More information

VOICE OVER IP THAT BOOSTS BUSINESS EFFICIENCY- TEN TIPS FOR GETTING IT RIGHT

VOICE OVER IP THAT BOOSTS BUSINESS EFFICIENCY- TEN TIPS FOR GETTING IT RIGHT VOICE OVER IP THAT BOOSTS BUSINESS EFFICIENCY- TEN TIPS FOR GETTING IT RIGHT Voice Over IP that Boosts Business Efficiency Ten Tips for Getting It Right Business phone service with VoIP is the new face

More information

Grandstream Networks, Inc. UCM6100 Security Manual

Grandstream Networks, Inc. UCM6100 Security Manual Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL

More information

All Rights Reserved. Release 5.6, March 2009

All Rights Reserved. Release 5.6, March 2009 All Rights Reserved The use, disclosure, modification, transfer or transmittal of this work for any purpose, in any form, or by any means, without the written permission from IDT/Net2Phone is strictly

More information

Safeguarding Networks Against Fraud. Connections 2014

Safeguarding Networks Against Fraud. Connections 2014 Safeguarding Networks Against Fraud Connections 2014 Safeguarding Networks Against Fraud Agenda Toll Fraud and VoIP Hacking Elliot Zeltzer, VP IP Engineering, BullsEye Telecom BroadSoft Tools & Tips for

More information

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Conducted by Javelin Strategy & Research June 2010 All Rights Reserved Rising Fraud

More information

Automatic Route Selection (ARS)

Automatic Route Selection (ARS) Automatic Route Selection (ARS) 19 Objectives When you finish this module, you will: Program numbers for external local calls. Use ARS to route a call. Understand how the system uses various CO dial tones.

More information

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and

More information

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving

More information

All Rights Reserved. Copyright 2009

All Rights Reserved. Copyright 2009 IMPORTANT NOTICE CONCERNING EMERGENCY 911 SERVICES Your service provider, not the manufacturer of the equipment, is responsible for the provision of phone services through this equipment. Any services

More information

Reference Guide Table of Contents

Reference Guide Table of Contents Reference Guide Table of Contents Overview and Quick Start 2 Log in and hear my messages 3 Skip, Forward, Save, or Delete a message 3 Change my PIN number (Passcode) 3 Change my Status while logged in

More information

Protect your Business phone systems from FRAUD!

Protect your Business phone systems from FRAUD! Protect your Business phone systems from FRAUD! Detailed hereafter are two examples of businesses whose telephone systems have been subject of fraud, also included is an extract from the Action Fraud website.

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

RING CYCLES ADMINISTRATIVE LINE FEATURES. AUTO DIAL Electronic Sets: 1. To program, press AUTO DIAL key 2. Dial number to be stored

RING CYCLES ADMINISTRATIVE LINE FEATURES. AUTO DIAL Electronic Sets: 1. To program, press AUTO DIAL key 2. Dial number to be stored Telephone Instructions All Washington University residence halls, fraternities and administrative offices for the Danforth Campus share the same telephone system. All lines begin with the prefix 935 or

More information

SPICE EduGuide EG0015 Security of Administrative Accounts

SPICE EduGuide EG0015 Security of Administrative Accounts This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and

More information

YOUR HOME PHONE. Horry Telephone Cooperative, Inc.

YOUR HOME PHONE. Horry Telephone Cooperative, Inc. YOUR HOME PHONE Horry Telephone Cooperative, Inc. CONTENTS Calling Features Anonymous Call Rejection page 4 Automatic Busy Redial page 4 Automatic Call Return page 5 Call Forwarding page 6 Call Forwarding

More information

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems VOIP Components Common Threats How Threats are Used Future Trends Provides basic network connectivity and transport

More information

System administration quick reference guide Norstar MICS, CICS, & Call Pilot Systems.

System administration quick reference guide Norstar MICS, CICS, & Call Pilot Systems. Norstar system administration guide 4-digit extensions Version 7.2 Dec 07 This administrator guide is intended to assist system administrators with day to day programming such as adds, moves, and changes.

More information

There are three main types of products based on VoIP technology that are available to you. They are:

There are three main types of products based on VoIP technology that are available to you. They are: A small business has many priorities things such as finding new customers, recruiting and retaining talented employees, keeping ahead of the competition and managing costs are a few that leap to mind.

More information

Managed Security Monitoring: Network Security for the 21st Century

Managed Security Monitoring: Network Security for the 21st Century Managed Security Monitoring: Network Security for the 21st Century Introduction The importance of Security The Internet is critical to business. Companies have no choice but to connect their internal networks

More information

Hosted PBX Features List

Hosted PBX Features List Hotbed Technology's Hosted phone system is a business phone system that is located at our Data enter and managed by our Team. This greatly reduces the hardware investment and maintenance required vs. Traditional

More information