Welcome to Our Blog

Discover insights, stories, and tips on various topics.

What is Phone Fraud?

Phone Fraud also known as “Telecommunications Fraud” or “Toll Fraud” occurs whenever an unauthorized user gains access to and/or places fraudulent charges to your telephone system. It can take many forms from unwanted collect calls to voicemail hacking. Whatever method a fraudster may use, your business’s best defence is knowledge.

Monitor Remote Access and Administration

Remote Access allows an inbound caller to access your business’s phone system and make outbound calls through it by using an access code. This is one of the most common modes of illegal entry into a phone system. To limit the risk to your business, use passwords and authorization codes to access these features. If your business does not use these features, contact your system administrator or provider to ensure that these features are turned off.

Use Strong Passwords and Authorization Codes

Your phone system’s security is only as strong as the passwords used to access it. Follow these tips to make sure your passwords and authorization codes are not easily guessed:

Frequently Change Passwords and Authorization Codes

It is a good idea to change your passwords and authorization codes at least four times a year. It’s also recommended that you change access/authorization codes whenever an employee (such as a network technician) leaves the company.

Control Long Distance Calling

Restrict Automated Attendant Access

Automated attendants are another common entry point for unauthorized third parties. When the automated attendant “picks up,” fraudsters can dial 91XX or 9011. On many phone systems (if the
dial-out feature is active), this extension connects the caller to an outside long distance line. The best defence is to block 9XXX or 8XXX access codes and/or require an additional authorization code.

Monitor Your System

Closely monitoring your phone system will help you to catch suspicious activity early. Watch for unusual patterns or usage spikes in your PBX, voicemail, automated attendant, and toll-free systems. These may be indicators that someone is attempting to gain access to your phone system.

Please take the precautions listed above. Ultimately, any unauthorized calls made to or from your phone system equipment — whether by someone in your company or by a third party — are your responsibility. It is essential that you take steps to protect your business from phone fraud.