BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Prevent Hackers from Stealing Your VoiP and Costing You Money

Prevent Hackers from Stealing Your VoiP and Costing You Money

Hackers Stealing VoIP

Best ways to prevent your business from losing money because of hackers stealing your VoIP service.

In 2017, telecom fraud amounted to $29.2 billion in losses to organizations and carriers, according to No Jitter. One form of telecom fraud is theft of service, which is obtaining service through an individual or company without payment. VoIP is much more prone to theft of service than traditional telephony services. Service can be stolen through hackers stealing user names, passwords, and other account information. Hackers also can introduce malware into the system to more easily enable theft. Unfortunately, the Federal Communications Commission has not issued any regulations on VoIP fraud, which means that businesses are still liable for any hacked calls. Fortunately, businesses can take some precautions to prevent theft.

Protect Passwords

When businesses buy a new phone, they should always change the password from the factory settings. Some phones use different passwords for the phone interface and web interface. In this case, unique passwords should be used for each interface. Passwords should be made secure by changing them every six months and requiring at least 12 characters including upper and lower case letters, symbols and numbers. Businesses also should regularly update the admin portal password for the VoIP provider.

Limit Physical Access

VoiP phones and other instruments should be kept in a locked space to prevent unauthorized access. The environment of the space should be maintained within the limits set by the equipment manufacturer. Secure access panels to the air conditioning and power.

Build Security in Layers

To prevent attacks and service theft, an organization should plan its VoIP system as carefully as it does its data network. One way is to plan security in layers.

  • The first layer of security is preventing intrusions on the network. To secure the network, use VoIP-aware firewalls and shut down ports at any sign of malicious behavior, according to Tech Target.
  • The second layer of security is phone authentication. The phone will not be authorized to the network or to the IP PBX unless a mutual certificate exchange or a certificate and dongle architecture have authenticated it, according to Tech Target.
  • The third layer involves encryption or authentication between the media and various channels. This means media gateways, ALGs, firewalls and NAT devices, and SBCs, according to Tech Target.
  • Finally, the fourth layer is user authentication. Only users authenticated via a user name and password or token device or mutual swap should be allowed to make or receive phone calls, according to Tech Target.

Disable International Calling

Most hackers go after the more expensive international phone numbers. Businesses that don’t need to regularly make international calls can disable international calling, using an international calling card when necessary. If regular international calling is required, businesses should carefully check invoices to be sure all calls made are legitimate.

More Like This

The Need for Your Business to Set Up Network Security Is Urgent

The Need for Your Business to Set Up Network Security Is Urgent In the early 20th century, if a crook wanted money, they’d rob a bank or steal a woman’s purse on the street. Real masterminds might devise an elaborate heist to hold up a Brink’s truck or befriend a millionaire, then make off with …

The Need for Your Business to Set Up Network Security Is Urgent Read More »

Read More

AA21-062A: Mitigate Microsoft Exchange Server Vulnerabilities

Original release date: March 3, 2021 Summary Cybersecurity and Infrastructure Security (CISA) partners have observed active exploitation of vulnerabilities in Microsoft Exchange Server products. Successful exploitation of these vulnerabilities allows an unauthenticated attacker to execute arbitrary code on vulnerable Exchange Servers, enabling the attacker to gain persistent system access, as well as access to files …

AA21-062A: Mitigate Microsoft Exchange Server Vulnerabilities Read More »

Read More

How Microsoft Dataverse Helps Your Organization Store and Manage App Data Securely

How Microsoft Dataverse Helps Your Organization Store and Manage App Data Securely Microsoft Dataverse is a software as a service (SaaS) solution capable of resolving wide-ranging data management and businesses’ storage issues. As an ever-increasing number of organizations generate a large amount of data, there is a need to manage it securely and efficiently. Thus, …

How Microsoft Dataverse Helps Your Organization Store and Manage App Data Securely Read More »

Read More

AA21-055A: Exploitation of Accellion File Transfer Appliance

Original release date: February 24, 2021 Summary This joint advisory is the result of a collaborative effort by the cybersecurity authorities of Australia,[1] New Zealand,[2] Singapore,[3] the United Kingdom,[4] and the United States.[5][6] These authorities are aware of cyber actors exploiting vulnerabilities in Accellion File Transfer Appliance (FTA).[7] This activity has impacted organizations globally, including …

AA21-055A: Exploitation of Accellion File Transfer Appliance Read More »

Read More

AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

Original release date: February 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency …

AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware Read More »

Read More

How IT Consulting Companies Can Help Overcome Technology Challenges

How IT Consulting Companies Can Help Overcome Technology Challenges Information technology helps businesses of varying sizes to enhance operations and thrive. To maximize the benefits of technology, businesses often enlist the help of established IT consulting companies. With the assistance of highly skilled consultants, organizations empower themselves with the right tools to bolster innovation and overcome …

How IT Consulting Companies Can Help Overcome Technology Challenges Read More »

Read More