5 tips to beat business phone fraud
As part of National Fraud Week, Telstra has released a list of security steps businesses can take to reduce the risk of their phone systems being hacked.
Telstra Business has taken the step of sending warnings out to its business customers following an increase in cases where hackers have gained unauthorised access to business phone systems.
Darren Kane, Director, Telstra Corporate Security and Investigation, said private automated branch exchange (PABX) units and voicemail systems were the most common fraud targets.
“Customers have been shocked to suddenly find themselves liable for debts worth tens of thousands of dollars - this is on top of the hassle and disruption to business these attacks can cause.
“While most businesses are aware of the risk of cyber-security and have taken measures to protect their business, the potential for a security breach of telephone equipment is often not considered,” Kane said.
“Unfortunately there are scammers who use all sorts of means to steal other people’s property, including telephone access, so customers really need to be thinking smart about ensuring their security measures are up-to-date.
“As with most equipment, the phone systems people use relies on PINs and passwords and if they are not up to date or regularly changed it’s like leaving the key in the door for a thief,” he said.
Telstra’s top five security for tips for business are:
- Conduct regular security audits of all voicemail, telephone and PABX systems. Cancel or disable features not required including old voice mailbox accounts.
- Regularly check both inbound and outbound call records, especially to unusual destinations, and calls made and received at unusual times. Don’t wait for your bill to check calls and costs. Use online billing to check call records at any time.
- Make sure access to phone or PABX systems is strictly limited, controlled and secured. Prepare a contingency plan and be ready to put it into action when a security breach occurs.
- Treat phone PINs as seriously any other financial or computer access code. Ban employees from using easy-to-guess PIN numbers and make sure they are secure, not written anywhere and changed regularly.
- Make sure computer security is up to date. Use firewall rules to block undesirable internet activity and close unused IP ports.
Bringing geospatial tools to infrastructure planning
Bentley Systems has joined forces with Google to enhance the way infrastructure is designed,...
Funding boost to transition heavy vehicles to electric
ARENA has made $100 million in funding available under its Driving the Nation program to support...
MEA protests terrace housing red tape
A recent determination by Energy Queensland Limited will impose an extra measure when connecting...