Toll Fraud
What is toll fraud?
Toll fraud is the theft or unauthorized use of long distance phone service. Toll fraud takes many forms but is especially prevalent to phone systems that have not been secure, or where lax security measures are in place. Toll fraud is a problem worldwide, and fraudsters can easily rack up tens of thousands of dollars in long distance charges before the phone's administrator is even aware of a problem.
How does it occur?
Fraudsters generally infiltrate your telephone system by using various techniques that help them guess the passwords for voicemail boxes. It is relatively simple for most fraudulent operators to access your telephone system if your passwords are easy to guess or if you haven't modified the default passwords issued when the telephone system was activated.
Your legal responsibilities
Costs associated with calls placed on your phone lines are your responsibility, regardless of whether you authorized those calls or not. For this reason, it is imperative that you take steps to protect your company against toll fraud.
How can you protect your phone system?
It is important to take steps against toll fraud. If you do not, it is only a matter of time before your company is victimized. This document will outline some general guidelines to protect your company against toll fraud, but we strongly encourage you to take any measures possible above and beyond what is listed here.
Toll restriction: International locations are the major destination for toll fraud calls. It is recommended that your company blocks all international numbers and only enable calls to those places that you need to call. Some systems allow for passwords to be required for long distance calls. If this is a possibility, we recommend you change the passwords regularly, and especially when an employee has left the company.
General security: Follow best practices for all security, including monitoring resources for vulnerability, maintaining patches and reviewing logs. Consider utilizing standards-based security add-ons where possible.
After-hours calls: Restrict all outbound after-hours calling.
Limit access: Limit system access to authorized personnel only, even during company business hours.
Passwords: Immediately change the default passwords provided with your phone systems, and include password changes as part of your regular maintenance, and when personnel leave your company. Require complex passwords.
Unused mailboxes and phones: Proactively disable mailboxes and remove all access to outgoing employees immediately. This is not only to protect against retaliation from disgruntled former employees, but also against anyone who may obtain that person's security information.
External transfer: Restrict call forwarding and call transfer features, especially to external numbers. Program your phone system so that extensions can forward only to known numbers, and restrict all others. Never forward a caller to 901 or 90#.
Software patches: Make sure your phone and voicemail systems are up-to-date and that all current patches have been installed.
Monitoring: Monitor calling patterns and usage on a regular, scheduled basis. High costs can be generated in a very short period of time and will continue until action is taken to stop it.
Block Collect Calls: Block the system from accepting revers charges on telephone calls - opt for a toll-free number instead.
DISA Numbers: Never publish any phone numbers that could provide direct access to your system (DISA). Change your DISA numbers periodically, and issue a different DISA authorization code for all users. Warn users to never write down their authorization codes.
Invalid Access Attempts: Identify invalid access attempts to your DISA and route them to an operator. Implement DISA ports that drop the line when an invalid code is entered and program your PBX to generate an alarm when an unusual number of invalid attempts are made, and to disable the port after a set number of invalid attempts.
Modems: Eliminate three-way calling on all extensions that use modems. Physically disconnect modems that are not in use.
Firewalls: Restricting access to your SIP port(s) on your PBX at a IP address or subnet level is an effective way of reducing your exposure to indiscriminate port scanning bot networks.