Stay Summer Safe

8.07.2019

We understand that Summer can be a vulnerable time for businesses, with reduced staff and less opportunity to spot the signs of fraud in time. We’re here to do all that we can to support you and your customers in reducing this risk.

Telephone and hosted system fraud is a global problem, reaping close to £30 Billion for criminals. An average incident can cost in the thousands.

The Federation of Communication Services (FCS) has produced some handy instructions to help businesses guard against fraud. We have used this information to create a customer checklist.

 

Customer checklist

A senior manager should be aware of these safeguards and ensure staff follow them as relevant.

  • Passwords and access codes should be changed regularly and if possible be alpha/numeric and as many digits as the system allows. Avoid 0000, 1234, extension number=PIN passwords.
  • Delete/change passwords for ex employees.
  • Consider limiting call types by extension, if an extension user has no requirement to ring international/premium rate numbers then bar access to these call types.
  • If possible, restrict outbound calls outside working hours.
  • Secure the system physically, site it in a secure comms room and restrict access to that area.
  • Regular reviews of calls should be carried out to cover analysis of billed calls by originating extension also to identify irregular usage and unexpected traffic.
  • Ensure you fully understand your system’s functionality and capabilities and restrict access to those services which you do not use.
  • Mailboxes – block access to unallocated mailboxes on the system, change the default PIN on unused mailboxes. Remove any unused mailboxes.
  • Be vigilant for evidence of hacking – inability to get an outbound line is usually a good indicator of high volumes of traffic through your system. Check for calls outside business hours.
  • Assess the security of all telephone and or hosted system peripherals/applications: platform, operating system, password and permissions scheme. Carefully evaluate the security of any onboard remote management utility (eg PC Anywhere) for possible holes.
  • Check firewall logs weekly.