{"id":2164,"date":"2019-12-30T14:26:43","date_gmt":"2019-12-30T14:26:43","guid":{"rendered":"http:\/\/internal.n4engage.co.uk\/?p=2164"},"modified":"2020-08-14T15:22:27","modified_gmt":"2020-08-14T15:22:27","slug":"preventing-sip-trunk-fraud","status":"publish","type":"post","link":"http:\/\/internal.n4engage.co.uk\/2019\/12\/30\/preventing-sip-trunk-fraud\/","title":{"rendered":"Phoney Phone Lines and Sure-Fire Security: How to Prevent SIP Trunk Fraud"},"content":{"rendered":"\n

While businesses go to great lengths to\nprotect their IT infrastructure against nefarious cyber\ncriminals, there is one vital aspect of business security that is so often\noverlooked \u2013 effectively securing your telephone system. <\/p>\n\n\n\n

Telephone fraud is not the most commonly known form of attack and\nyou\u2019d be forgiven for thinking it\u2019s not something that happens often in the UK.\nIn actual fact, phone fraud – or toll fraud – is on the rise with an estimated\n84% of UK businesses at risk of an attack and the UK is one of the top five\nmost targeted countries in the world. <\/p>\n\n\n\n

Toll fraud can have the same detrimental effects on a business as\ncyber attacks, including reputational damage and financial losses. Therefore,\ntaking measures to protect your phone system should not be underestimated.<\/p>\n\n\n\n

What is toll fraud? <\/h2>\n\n\n\n

Toll fraud typically occurs when a hacker uses an IP scanner to search\nthe internet and identify publicly facing phone systems. They use brute force\nattacks or even default vendor passwords (such as admin\/admin) to gain access. Once\nin they will set up diverts and calls to expensive international destinations\nand take a slice of the revenue generated from these calls.<\/p>\n\n\n\n

In most case, this goes undetected and businesses only find out that\nit\u2019s happened when they receive their next phone bill. By then it\u2019s too late\nand hackers have potentially run up tens of thousands of pounds in fraudulent\ncalls. And guess who\u2019s liable for covering the costs of such bills \u2013 you are.<\/p>\n\n\n\n

Hackers can gain access to your network in seconds whether you have an analogue, digital or IP based phone system. However, it\u2019s important\nto remember that SIP trunking exposes your phone system to IP level threats, which\nmakes SIP trunks particularly susceptible to this type of\ncrime. <\/p>\n\n\n\n

Bank Holidays, weekends and other out-of-office\nhours are prime times for hackers to try and access your phone systems. So, as\nyour business winds down for the festive season, ensure your IP phone network\nis secure with our top tips.<\/p>\n\n\n\n

7 ways to help prevent SIP trunk fraud<\/h2>\n\n\n\n
  1. Set spending alerts<\/strong>: Contact your SIP trunking provider to set a spend threshold that will generate alerts once the limit has been reached.<\/li>
  2. Create complex passwords<\/strong>: Ensure you change all your phone system\u2019s default passwords to unique, secure passwords. Use a minimum 10-character mixed case password with a combination of letters, symbols and numbers. You should change default usernames where possible too. Also remember to change your passwords regularly, including voicemail mailbox, extension and remote access passwords.<\/li>
  3. Implement a call barring plan<\/strong>: Where possible, bar outgoing international or premium rate numbers. Banning outgoing calls outside of office hours will also help keep your phone system secure. Block any suspicious incoming phone numbers to help prevent the caller from gaining access to your information.<\/li>
  4. Disable unused features<\/strong>: If you don\u2019t use certain features, such as conference calling facilities, disable them. At the very least, disable them for the extensions that do not make these types of calls. If they are needed, consider setting destination restrictions, so only certain destinations can be dialed.<\/li>
  5. Review phone logs and statements<\/strong>: Regularly checking call traffic to and from your business will make it easier to pick up any anomalies that could be fraudulent. Checking your bills thoroughly will also alert you to any suspicious activity.  Our hosted collaboration customers can utilise Call Reporting and Analytics to analyse and report on call traffic.<\/li>
  6. Set up a firewall to protect your phone system<\/strong>: To keep your telephony platform as secure and private as possible, set up a firewall or SBC to prevent your system from being exposed directly on the internet. This includes management ports as well as SIP ports.<\/li>
  7. Use a SIP trunking provider who prioritises your security:<\/strong> Here at N4Engage our ISO 27001 certification ensures that we meet stringent control requirements for our SIP platform to offer our customers the highest possible level of quality and security. We can also provide you with monthly insights on your call spend and monitor changes in patterns to help detect suspicious activity. <\/li><\/ol>\n\n\n\n

    Find out more about our SIP Trunking solution<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

    While businesses go to great lengths to protect their IT infrastructure against nefarious cyber criminals, there is one vital aspect of business security that is so often overlooked \u2013 effectively securing your telephone system. Telephone fraud is not the most commonly known form of attack and you\u2019d be forgiven for thinking it\u2019s not something that […]<\/p>\n","protected":false},"author":13,"featured_media":4197,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[92],"tags":[],"yoast_head":"\nBlog: How to Prevent SIP Trunk Fraud - N4Engage<\/title>\n<meta name=\"description\" content=\"Businesses go to great lengths to protect their IT infrastructure against cyber attacks but effectively securing your telephone system is often overlooked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/internal.n4engage.co.uk\/2019\/12\/30\/preventing-sip-trunk-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blog: How to Prevent SIP Trunk Fraud - N4Engage\" \/>\n<meta property=\"og:description\" content=\"Businesses go to great lengths to protect their IT infrastructure against cyber attacks but effectively securing your telephone system is often overlooked.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/internal.n4engage.co.uk\/2019\/12\/30\/preventing-sip-trunk-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"N4Engage\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-30T14:26:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-14T15:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/internal.n4engage.co.uk\/wp-content\/uploads\/2019\/12\/Phoney-phones-lines-and-sure-fire-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"http:\/\/internal.n4engage.co.uk\/#website\",\"url\":\"http:\/\/internal.n4engage.co.uk\/\",\"name\":\"N4Engage\",\"description\":\"The Collaboration Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"http:\/\/internal.n4engage.co.uk\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/internal.n4engage.co.uk\/2019\/12\/30\/preventing-sip-trunk-fraud\/#primaryimage\",\"inLanguage\":\"en-GB\",\"url\":\"http:\/\/internal.n4engage.co.uk\/wp-content\/uploads\/2019\/12\/Phoney-phones-lines-and-sure-fire-security.jpg\",\"width\":1024,\"height\":683},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/internal.n4engage.co.uk\/2019\/12\/30\/preventing-sip-trunk-fraud\/#webpage\",\"url\":\"http:\/\/internal.n4engage.co.uk\/2019\/12\/30\/preventing-sip-trunk-fraud\/\",\"name\":\"Blog: How to Prevent SIP Trunk Fraud - N4Engage\",\"isPartOf\":{\"@id\":\"http:\/\/internal.n4engage.co.uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/internal.n4engage.co.uk\/2019\/12\/30\/preventing-sip-trunk-fraud\/#primaryimage\"},\"datePublished\":\"2019-12-30T14:26:43+00:00\",\"dateModified\":\"2020-08-14T15:22:27+00:00\",\"author\":{\"@id\":\"http:\/\/internal.n4engage.co.uk\/#\/schema\/person\/0b699d51b22f4096c0f942694604cea3\"},\"description\":\"Businesses go to great lengths to protect their IT infrastructure against cyber attacks but effectively securing your telephone system is often overlooked.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/internal.n4engage.co.uk\/2019\/12\/30\/preventing-sip-trunk-fraud\/\"]}]},{\"@type\":\"Person\",\"@id\":\"http:\/\/internal.n4engage.co.uk\/#\/schema\/person\/0b699d51b22f4096c0f942694604cea3\",\"name\":\"Jordan Kirby\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/internal.n4engage.co.uk\/#personlogo\",\"inLanguage\":\"en-GB\",\"url\":\"http:\/\/2.gravatar.com\/avatar\/ec61fd6f6205915c2d93e490ca022952?s=96&d=mm&r=g\",\"caption\":\"Jordan Kirby\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/posts\/2164"}],"collection":[{"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/comments?post=2164"}],"version-history":[{"count":8,"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/posts\/2164\/revisions"}],"predecessor-version":[{"id":4198,"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/posts\/2164\/revisions\/4198"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/media\/4197"}],"wp:attachment":[{"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/media?parent=2164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/categories?post=2164"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/internal.n4engage.co.uk\/wp-json\/wp\/v2\/tags?post=2164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}