Risk-Free Trial      Online Chat      Contact Us      Blog      FAQs     Call: 800-588-2350      

IPComms Blog
Keeping you current on the latest in unified communications.

11 Steps to Secure your PBX

11 Steps to Secure your PBX

 

Don't be a victim of telecom theft

If you are reading this, you're probably like most of us... after many hours, or even several days of downloading software, setting up servers, configuring trunks and cracking open firewall ports, you finally achieve success - your PBX is working, and calls are passing.   So, you wipe the sweat from your forehead, push away your ergonomic mesh-backed office chair (with lumbar support) and walk away pleased - not giving a second thought to security.  Until one day, you log into your PBX and see the skull-and-boned call sign of a hacker that has decided to pay you’re perfectly running PBX a visit. 

Read more

What is Telecom Fraud?

What is Telecom Fraud?

Plain and Simple.  Telecom fraud is theft!

So, you just received your monthly phone bill from your phone service provider.  What you expect to see is a total somewhere around 30 or 40 bucks.  However, to your amusement, you read "Total Due: $84,534.00" at the bottom of the bill.   After a lengthy conversation with a department that you didn't even know existed until now "The Fraud Management Department" you are informed that the bill is accurate your IP PBX has placed more than 100,000 minutes of outbound calls to Cuba and North Korea.  Furthermore, they want to know when and how you plan to pay.

Unfortunately, the scenario described above is not fictional and in no way exaggerated; more understated if anything.   As with anything connected to the public Internet these days, VoIP-based phone systems

Read more