Preventing theft of service in VoIP

Preventing theft of service in VoIP

VoIP phone systems use the internet just like any PC. Therefore, hackers can gain access to your servers and data network through VoIP phones. Understanding how to combat theft of service in VoIP is critical, and if you want to learn how to do it, read on.

What is theft of service?

Internet-based calls are far more vulnerable to fraud compared with more traditional telephony services. VoIP calls face threats from identity theft, eavesdropping, intentional disruption of service, and even financial loss. Theft of service, the most common type of VoIP fraud, includes stealing usernames, passwords, and account information. Hackers usually introduce viruses into your system to crash it or steal user passwords.

From a legal standpoint, theft of service means obtaining service from an individual or a company without payment. It may involve: deleting or changing invoicing records, unauthorized invoicing, or taking the property of a service provider.

Also, hackers may simply want to crash your system and will flood the network with packets of data so that callers lose access. They may also try to intercept the packets to eavesdrop on calls.

A third type of VoIP hack accesses your VoIP system and allows spammers to flood your office with promotional calls similar to junk email. This type of attack is called SPIT (spam over internet telephony). Once a hacker accesses your communications system, they might broadcast unsolicited messages, advertisements, or other commercial messages over your VoIP.

The solution

Defending against theft of service does requires nothing new or unusual, just a little common sense as well as technical preventative measures.

Common-sense measures involve even IT novices who can make your passwords as secure as possible and, obviously, prevent unauthorized physical access and use of your VoIP phone instruments. The technical stuff? Keeping your antivirus software up to date, combined with fraudulent call routing detection and encryption software.

VoIP has rapidly become an essential business communication tool, so it makes perfect sense to understand exactly what theft of service is to avoid its negative impact. We’d be more than happy to give you advice on implementing any of these protections or managing your VoIP services. Give us a call to get started.

Published with permission from TechAdvisory.org. Source.


Doug Renner

Principal Consultant

Doug Renner is a veteran of both business and the information technology industry. His most recent endeavor was founding Peak IP Solutions where he started the company in 2004 and led it for 14 years. Peak IP Solutions grew rapidly from inception to over $13MM in annual sales in just six years. They were recognized by CRN Magazine in the NextGen 250 category as a leader in the VAR/MSP space. Major partnerships with Cisco, VMware, Veeam, HP, InfoBlox and others helped drive the businesses growth in sales along with steady growth in their Security, Voice, and Network Managed Services solutions. In March of 2018, Telcion Communications Group acquired Peak IP Solutions. Doug has held many certifications over the years beginning with his Microsoft MCP on Windows NT 3.5. In 2000 Doug started working for Cisco where he earned several Routing, Design, Voice, Security and Data Center certifications. Currently Doug is working with Telcion to transition clients and business aspects. He continues to enjoy the technology and supports projects in the Bay Area geography. Doug enjoys time with his wife and two daughters, driving and camping in Volkswagen Vanagon Syncro campers, Snowboarding, Mountain Biking Investing, and walking Abbi, the family’s Australian Shepherd.