Are You Vulnerable to This $38 Billion Cybersecurity Threat?

When most people think about cybersecurity, they think about firewalls and encryption standards to protect apps and databases from being the victim of hackers. However, there are glaring flaws in many enterprise systems, some of which are bigger than most people realize. These problems go unnoticed, and therefore unaccounted for, and more businesses end up falling victim to them.

Take, for example, your telecommunications system. Chances are, this is only a secondary priority for your security and IT teams, yet telecommunications fraud costs businesses more than $38 billion a year, according to the Communications Fraud Control Association (CFCA). Vyopta illustrates the potential damage here by recounting the story of an architecture firm in Norcross, GA that discovered $166,000 in fraudulent phone charges, accrued over a single weekend.

Biggest Vulnerabilities in Telecom

There are several ways for criminals to take advantage of a flawed telecommunications system. Many take advantages of Private Branch Exchange (PBX) systems, by using direct inward system access (DISA). When criminals get ahold of a phone with PBX functionality, or gain access to a voicemail system, they can use system commands to get access to a dial tone-and then place as many long-distance calls as they like. At this point, they usually sell access to this line for a profit. Voicemail fraud is also a common target.

Best Practices for Securing Your Business

You don’t want your business to accumulate hundreds of thousands of dollars in fraudulent charges, or expose your business’s systems to cybercriminals. Be proactive and guard your business against these potential breaches with the following best practices:

1. Don’t rely on factory default settings.

When you get new phones or voicemail boxes from your telecom provider, they’ll come with a number of factory default settings, including a default password (which is usually something like “0000.” You’ll want to change these as soon as possible, because factory default settings are notoriously easy to guess.

2. Educate your staff on threats and best practices.

Most successful hacking attempts are the result of a human error (or failure). Your employees may not choose strong passwords, they may leave their phones unsecured, or may otherwise make a mistake that makes it easier for thieves to gain access. You can’t prevent every mistake, but you can take measures to better educate your workers on existing threats and best practices for preventing them. Make sure your employees choose strong passwords, disable services they don’t need, and avoid leaving their mobile phones unsecured or unattended.

3. Disable international and premium rate access.

Most telecom hacking attempts have one end goal: gain access to a phone line to place international and premium-rate phone calls. If you simply disable your phones’ ability to place these types of calls (which is easy for most providers), you’ll instantly protect yourself from these fraudulent charges. However, this assumes you don’t need access to these features on a regular basis.

4. Change access codes and passwords regularly.

Mandate that voicemail access codes and other phone-related passwords be changed regularly. If someone does seize control of one of your devices, you’ll be able to lock them out quickly.

5. Disable DISA if you don’t need it.

It’s also a good idea to disable direct inward system access (DISA), unless you absolutely need it for your business. This could cut off an entire branch of potential fraud, since dialing in remotely is a prime opportunity for hackers.

6. Secure your comms room.

If all your communications equipment is centralized in one location, you’ll need to make sure that location is secure. Have an IT staff member routinely review proper security procedures, and lock the room down so only necessary staff members have access to it.

7. Review call use on a regular basis.

Finally, don’t let yourself be surprised by a sudden accumulation of charges. Take time, routinely, to review the phone calls being placed by your company, and flag any outliers. Chances are, one rogue international call isn’t a sign that you’re the victim of fraud, but it’s worth reviewing and following up so you can stop the criminal activity before it escalates beyond your control.

With these seven simple strategies, you’ll be able to prevent the vast majority of telecom security vulnerabilities. That doesn’t mean your business will be suddenly exempt from criminal activity, but it will greatly decrease your chances of falling victim to this $38 billion threat.

Hot this week

Did David Wineland and Serge Haroche Steal Idea For The Nobel Physics Prize?

Dr. Omerbashich says the Royal Swedish Academy is a Crime Scene and he has the proof that Nobel laureates stole his discovery.

New Approaches to Disaster Relief Challenges

Disaster relief has always been a challenge. NASA, Google,...

3 Legitimate Money Making Methods to Supplement Your Income

In a perfect world, when your landlord raises your...

2016 Predictions by World Renowned Medium and Psychic Lindy Baker

World renowned medium and psychic Lindy Baker is interviewed by The Hollywood Sentinel, discussing psychic power, the spirit world, life after death, areas of concern in 2016, and much more.

Digital Coupon Customers Spending More Than Double At Stores

A new study shows that customers who use digital coupons go shopping more for groceries and other household goods more often and spend more on their shopping trips.

Sporting Drama “Off The Line” Sets May 13 Release

Electric Shock Production’s sporting drama feature film "Off The...

No One Is Innocent In Gaza

Who is Hamas? Hamas Covenant Main Points Hamas Charter Hamas’ revised...

1 effects of climate change on geopolitical stability:Happy

Now climate change stokes sharp geopolitical shifts, straining resources and alliances worldwide. What secret power stirs unexpectedly beneath rising tensions?

7 business ideas trends Inspire Growth

Business ideas trends ignite visionary startup shifts while clever insights fuel curiosity that leaves readers wondering what surprise lies ahead.

1 disruptive technology examples Ignite Remarkable Change

Explore disruptive technology examples that reshaped industries and sparked radical shifts. Could this change our future in ways beyond imagination?

5 Simple Ways to Be a Coworker Others Can Depend On

If you’re walking into a new job and you...

diy home projects for beginners: Bright Home Ideas

Ready for a hands-on home upgrade? Beginner-friendly DIY projects offer clever ideas and surprising twists that will leave you wondering…

Related Articles

Popular Categories