Telecoms Fraud Protection

Overview

Toll Fraud (also known as call phreaking or dial through fraud) is becoming increasingly common in the UK. It occurs when someone dials into your phone system to use your telephone lines to route calls, often to international destinations at your expense.

Cybercrime has become a multibillion pound illegal business that is now four times greater than a credit card fraud, generating masses of income for organised criminals. In addition to running up extremely expensive bulls, it can render the phone system unusable by the firm, effectively closing down your business for days on end.

Many people have heard of toll fraud but mistakenly believe that it does not happen in the UK. In fact the UK is one of the top 5 countries in the world where toll fraud occurs and 40% of companies have been hit at some point. It is believe that toll fraud costs UK businesses up to 1.5 billion per annum and this figure is set to rise more and more.

Features

There are additional safeguards that can help protect you from these attacks but as the skill level of hackers grow we are always endeavouring to be one step ahead. To protect you from these costs. Legal TX have now introduce Telecoms Fraud Protection for all of our customers.

  • 365 days a year of monitoring, 24 hrs a day
  • Call barring on any recognised illegal activity over our network
  • High usage email alerts
  • Free telephone system password monitor and updates
  • Cover the first £2000 of exposure in a telecoms fraud event (subject to an excess of the first £250.

 

AVOID TELECOMS FRAUD

Ensure that you are putting the following measures into practice to avoid scams:

  • Make sure you change the security settings and passwords on your telephone system from the default or factory settings
  • Change voicemail passwords regularly and protect them and your access codes from authorised use
  • Remove or deactivate any telephone system functionality that you don’t need including remote access ports
  • Never publish the remote access phones that connect calls to your voice mail system
  • Keep an eye on your monthly phone bills for anything that looks unusual
  • Carry out regular audits on your telephone system, including privileges and restrictions
  • For systems that have remote access or SIP, ensure firewall and routers are secured appropriately