Business Telephony Security

Similar documents
PBX Security in the VoIP environment

NICC ND 1438 V1.1.1 ( )

8335 Guilford Road Suite H Columbia MD

Recommendations for secure deployment of an IP-PBX

Hosted VoIP Feature Set

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

Auto Attendants. Call Management

Hosted Business Class VoIP Features

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

AUTO ATTENDANTS CALL MANAGEMENT

White Paper. avaya.com 1. Table of Contents. Starting Points

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

Intermedia Cloud Softphone. User Guide

Concept Note. powering the ROC. PBX Hacking.

How To Protect Your Network From A Hacker Attack On Zcoo Ip Phx From A Pbx From An Ip Phone From A Cell Phone From An Uniden Ip Pho From A Sim Sims (For A Sims) From A

Ingate Firewall/SIParator SIP Security for the Enterprise

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

6 Steps to SIP trunking security. How securing your network secures your phone lines.

KIPCOM Limited. Contrex Service Description

iphone Softphone App for the Opera IP System Installation and user guide

VoIP Security. Customer Best Practices Guide. August IntelePeer

IP Office Technical Bulletin

Cloud9 Hosted PBX Feature Guide

Online Tools. CommPortal. Go to User Name: Your 10-digit telephone number (no dashes) Password: Your voice mail password

Recommendations for Provisioning Security

Category: ClearTrunk Hosted PBX Features

SIP Trunking and the Role of the Enterprise SBC

How To Protect Your Business From A Voice Firewall

A Decision Maker s Guide to Securing an IT Infrastructure

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

CloudSpan VoIP Services Feature List

Sipstream Hosted PBX Supervisor Guide. Sipstream Hosted PBX Supervisor Guide

Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0

Hosted PBX Features List

Configuring the CounterPath X-Lite SIP Softphone

Managed Services. Tiger Managed Services Information

Avaya IP Office Unified Communications for Small Business

A host of hybrid phone solutions... SIP Trunk Solutions

Position Paper Toll fraud prevention Lock thieves out of your phone system

Securing Unified Communications for Healthcare

PBX Fraud Educational Information for PBX Customers

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

With 360 Cloud VoIP, your company will benefit from more advanced features:

Business Phone Security. Threats to VoIP and What to do about Them

VoIPOffice. VoIPOffice Hosted Edition provides advanced features such as Unified Messaging, Automatic Call Distribution,

With HD quality Full transparent networking features And on-demand capacity enhancements

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

Hosted Telephony. An Introduction to Our Hosted Services. Managing your Customers. IPW Products. IPW Hosted Telephony

Compliance and Unified Communication

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

InSciTek Microsystems 635 Cross Keys Park Fairport, NY Setting up Your Phones

FEATURE LIST. Feature Description Type

PBX Fraud Information

Whitepaper. The Top 10 Advantages of 3CX Phone System. Why your next phone system should be software based and by 3CX

UC Office for Smart Phone - iphone Edition

MyPBX Security Configuration Guide

Voice and Data Convergence

User Features. Hosted VoIP Services. Administrator Guide. Revision 1.2 GCI. Global House. 2 Crofton Close. Lincoln LN3 4NT.

Introducing Cisco Voice and Unified Communications Administration Volume 1

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Security Controllers. Product Overview

IP Office Embedded Voic User Guide (IP Office Mode)

How To Get A Phone Service For Free

WorkTime UC Mobile Admin Guide

KX-NS. Cellular Phone as Extension

The #1 Issue on VoIP, Fraud!

Presented by Evan Sylvester, CISSP

Best Practices for Securing IP Telephony

VoIPon Tel: +44 (0) Fax: +44 (0)

3CX Guide sip.orbtalk.co.uk

SBC WHITE PAPER. The Critical Component

Telco Depot IP-PBX Software Features

VoIP Security regarding the Open Source Software Asterisk

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

FAQ - Features Question Question Question Question Question Question

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller

Siemens OpenScape Voice V7 SIP Connectivity with OpenScape SBC V7. to Integra SIP Service

Elastix SIP Firewall. Quick Installation Guide

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

2N OfficeRoute. 2N OfficeRoute & Siemens HiPath (series 3000) connected via SIP trunk. Quick guide. Version 1.00

Transcription:

Business Telephony Security Toll Fraud - What is it? Toll Fraud or Phreaking is the process of illegal hacking of telecoms systems for the purpose of exploiting phone numbers to profit from premium rate numbers. How Big A Problem Is It? Global Telecoms Hacking Fraud Is estimated at costing business 25bn annually. The UK is the 3rd most hacked country in the world Is estimated at costing businesses over 1bn annually. Approximately 84% of businesses are threat in the UK Due to insufficient security measures 69% of UK businesses last year reported security breaches Compared to 59% global average Average cost to a UK business effected from toll fraud 10k Phone fraud is FOUR times bigger than credit card fraud globally. x4

How the Hacking is Done The hackers/phreakers can strike any system, and at any time. However, they usually mount an attack outside of office hours on public holidays, evenings or weekends as the likelihood of detection is lower. Even before they carry out an attack by dialling the expensive numbers, the hackers will have already penetrated your telephone system without your knowledge. This is usually done via the programming ports or your voicemail boxes, as access codes are easily cracked no matter how often they are changed. Hackers then configure your system for their own use so they can use it for their own traffic at any time. SIP Scripts Add a trunk to a PBX and use it dial out and call Premuim Rate Numbers Voicemail Hacking Compromise PIN numbers to exploit voicemail outcalling Softphone Attack Intercept Wi-Fi traffic to clone a softphone Hosted Phone System Security Measures Call Barring Customers have the ability to set flexible call barring rules themselves via our customer portal, or we can add them on their behalf. Calls can be barred to any number prefix and from any number of individual extensions (or from all of them).

Hosted Phone System Security Measures Credit Limits Normally, calling credits are added on a pre-paid basis, so calls can only be made to the value of the credits purchased. However, in the case of post-paid accounts, a monthly call limit is agreed and if this is reached, no more calls can be made until we have agreed with the customer to increase the limit. Calling Pattern Analysis We have a very effective fraud management system in place which monitors all traffic and prevents (and immediately alerts us to) calls which reach pre-defined limits based around: Cost Duration Volume Call Rate Destination incovo s hosted system also monitors the usage patterns (such as time of day, average call length, frequency of calls etc.) of each account and alerts us to any exceptional conditions. Login Password

Basic Security Measures Restrict certain numbers or destinations (e.g. premium rate and international calls) Analyse PBX call logs and reports for anomalies, out of hours calls, etc. Change voicemail passwords on a regular basis and avoid obvious combinations (e.g. 1234 or the extension number) Lock surplus mailboxes and de-activate all unnecessary system functionality Remove voicemail outcalling Restrict access to equipment (e.g. comms room) Safeguard internal directories, call logs reports, etc. to prevent unauthorised access Review procedures for leavers and for vetting new recruits Review and update system security, with action plans for any weak areas identified Want to Discuss Your Security with One of incovo s Security Experts? Interested? To find out more information on telephony security, call 0845 450 8400

Featured Solution: Avaya Session Border Controller Avaya SBCE 6.2 brings a new level of SIP security Avaya SIP-based Unified Communications solutions for both Enterprise and SME. Features: Element Management System (EMS): well-constructed craft interfaces for simplicity of implementation and administration of the Avaya SBCE 6.2 product. Advanced UC Security including protections against Toll Fraud, Call Walking, etc. Deep Packet Inspection for both signaling and media. Beyond your enterprise data network firewall, a critical component in delivering SIP-based communications is the device that secures your SIP and VoIP connectivity. Data network firewalls protect a variety of traffic types, however they are not application aware for SIP-based communications. The Avaya Session Border Controller for Enterprise provides a secure interface for SIP trunking and remote worker connectivity. With secure SIP connectivity you gain trunk and client protection, VPN-less remote worker integration, and easy-to-provision enterprise access management. About incovo incovo is a communications technology integrator of category leading unified communications, infrastructure, integrated network solutions and document management solutions to small and mid-sized organisations throughout the UK. Our focus is creating dependable, cost effective business communications solutions for businesses that ensure a variety of methods of collaboration to meet the ever changing market conditions. At incovo, we provide fast and effective support to all of our customers through our multichannel support network allowing our customers to feel the benefits of compelling solutions that will enable their businesses to grow, tailored to their needs.