{"id":1075,"date":"2016-06-07T16:10:11","date_gmt":"2016-06-07T05:10:11","guid":{"rendered":"\/?p=958"},"modified":"2016-06-07T16:10:11","modified_gmt":"2016-06-07T05:10:11","slug":"stop-pbx-voip-hacking","status":"publish","type":"post","link":"https:\/\/infinititelecommunications.com.au\/stop-pbx-voip-hacking\/","title":{"rendered":"11 Easy Ways To Stop PBX & VoIP Hacking"},"content":{"rendered":"

PBX & VOIP Hacking<\/h2>\n

PBX & VOIP hacking is responsible for millions of dollars in losses for organisations each year, and it’s having a\u00a0massive impact on Australian businesses.<\/p>\n

Who will protect your business from hackers?<\/h2>\n

PBX & VOIP hacking can result is a substantial amount of unauthorized call charges on your telecommunications account from people or groups who have infiltrated your system and used it to make long distance and international calls without your knowledge.<\/p>\n

It is your responsibility to protect your business from hackers. If you are ever hacked, you’ll have to pay the charges. Ideally, your provider would have briefed you when you purchased your\u00a0phone system; they should have told you\u00a0about the risk of hacking and ways that you can avoid it. You should contact them first if you do find your business phone system has been breached.
\nInfiniti may provide notification if we suspect any possibility of fraud on your account, however, we may not find out until after the event. Maintaining your system security is not our responsibility, nor is any damage caused\u00a0should your system be compromised. That responsibility to protect your business from hackers falls onto you.<\/p>\n

How and why does it happen?<\/h2>\n

The main point of hacking your phone system or service is so that the hackers can make obscure international phone calls at no cost to themselves at all;\u00a0\u00a0any charges are payable by the organisation whose system or service has been\u00a0hacked. If they do it for long enough undetected, these costs can become quite large.
\nThey exploit any\u00a0weaknesses in a company’s phone system by deciphering their voicemail pins and or call feature codes. Once they have entered the system they can then reprogram it to make international phone calls.They will then do one of two things; mimic\u00a0an operator to on-sell calls, or divert the calls to their own plans. This means they don’t have to pay a cent for anything,\u00a0while the hacked business is left with the bill.
\nMost often a hacker will attempt to do this after office hours in order to avoid detection. This also means that a lot of damage can be done before anyone in your office notices a problem.<\/p>\n

Ways to Protect your Business Hackers<\/h2>\n