Computer hackers have been known to the world for many years. A new kind of hacker has emerged recently targeting international long distance calling. These hackers gain access to your phone lines usually via your phone system and rack up thousands of long distance minutes without your knowledge. Before you know it, you have a hefty bill from your phone line or long distance provider and unfortunately you are responsible to pay it.
Phone companies have been warning their customers about criminal activity targeting phone systems of all brands for fraudulent usage. Many new systems have built-in security features that prevent fraudulent and unauthorized use. However, often the problem relates to systems without security passwords or the use simple passwords.
This is a list of recommendations and best practices that you can use to ensure maximum security for your phone system and phone lines.
1- ensure that you use passwords on your entire phone system including administrative access to the system, voicemail boxes, etc.
2- do not use simple passwords such as 1111, 2222 or 1234. Create passwords with at least 6 digits or 8, if possible.
3- never start passwords with a 0 or 1 and never use your own number or extension
4- change factory pre-set passwords, system passwords are available on the internet
5- change your password regularly, every 3 months is good practice
6- restrict international calls if possible or contact your phone provider and request for long distance access codes
7- password protect call back or call bridge phone system features with complex 8 digit passwords
8- disable unused extensions and voicemail boxes, if possible
9- if you’re using softphones, ensure that a complex unique 8 digit password is used
10- Phone systems are just like computers, ensure that you have the latest software and firmware updates.
There may be other steps you’ll need to take to ensure maximum security of your phone system. Its recommended that you contact your phone system provider for more information on how to conduct a security audit.
Is this information helpful? Please leave your comments.