Why you may need a Toll Fraud Health Check

You’ve invested a lot into your collaboration and communications solutions, and as today’s systems have gotten more advanced, so have the ways that they can be compromised. Most organizations spend significant time and money protecting their systems from exploits while overlooking one of the biggest attack vectors, toll-fraud via their PSTN or IP-based telephone systems. When this happens, an organization may find itself the victim of toll-fraud to the tune of thousands of dollars.

A common form of toll fraud attacks is when bad actors illegally exploit the programming and dialing-rules within a telephone system for financial gain. With control of your system, the attacker can resell access to others making expensive long-distance calls, or they can run up call charges on premium-rate numbers to get a cut of the revenue generated. Either way, the bad actor gets paid, and you end up with the bill.

Toll fraud attacks can happen via traditional PSTN phone services but most commonly happen via SIP or IP-based communications with telephone equipment. There are ways to minimize this attack vector: Stringent dial-plan programming, least-required-access calling permissions for end-users and systems, and anomalous communications detection, to name a few.

Whether your communication system has been in place for years or is relatively new, consider letting a Cerium specialist review the configuration for best practices implementation. Even if Cerium initially deployed your solution, changes made over time may have unknowingly opened opportunities for toll fraud exploits. A Cerium health-check will ensure your platform is ready to deter phone-system fraudsters.

Our Toll-Fraud Health-Check provides a review of your dial-plan, calling-permissions, and the security features of your telephone system and associated core applications such as voicemail and firewall traversal applications. For under $1000 of professional services from Cerium Networks, our engineers will track down opportunities that could exploit your system and make actionable recommendations for minimizing the attack vector presented through the PSTN and IP communications. At the end of the discovery engagement, we deliver a detailed report of our findings, known vulnerabilities in the configuration and suggested remediations. For minimal additional professional services, we will make the changes for you as well.

 

Schedule your toll fraud health check

Bad actors are consistently trying to utilize other people’s assets to make a profit. Let’s work together to make their lives a bit harder.

Contact Cerium

Related Articles

A sampling of other articles you may enjoy if you liked this one.

CJIS-Compliant Managed Services
Dec 12, 2019

How Cerium works with Law Enforcement Agencies to Protect Criminal Justice Information The FBI’s ...

Read More
Does Your Organization Understand its NIST CSF Target Profile?
Dec 5, 2019

As it turns out, securing the network is hard. A securely optimized network is complex to deliver an...

Read More
Protecting Your Organization From Itself
Dec 3, 2019

IT Departments are under immense pressure to ensure the security of corporate data while still being...

Read More
Stay in the Know

Stay in the Know

Don't miss out on critical security advisories, industry news, and technology insights from our experts. Sign up today!

You have Successfully Subscribed!