A Garda Síochána. PABX Fraud Explained

Size: px
Start display at page:

Download "A Garda Síochána. PABX Fraud Explained"

Transcription

1 A Garda Síochána PABX Fraud Explained Q: What is PABX fraud? A: PABX fraud is defined as the unauthorized use of a company's phone system. It is theft of long-distance services by a) an unrelated third party, b) a staff member of a long-distance carrier, local telco or vendor, or c) the user's staff member. Q: What are the most frequently used methods of toll fraud? A: There are seven frequently used methods of committing toll fraud. They are: 1. PBX manipulation, 2. Voice mail penetration, 3. Failure to install/use CDR or SMDR, 4. Maintenance port tampering, 5. Remote access abuse (DISA), Q: Who is most likely to access our equipment unlawfully? A: As is the case with any other unlawful act, criminals in this industry, who are referred to as "hackers," do it mainly for the money. Others do it for fun, professional challenge and/or out of boredom. Still others know how easy it is, know the codes, have the proper equipment and cannot resist the temptation. In most cases, they can recognize the manufacturer/brand by the prompts and determine which password ranges on which to concentrate. With some luck and persistence, they will "hack" into their first system within the hour. Most of the activity is through call/sell operators who operate in urban communities, mainly by immigrants for immigrants who call to countries like the Dominican Republic, China, Pakistan and Egypt at a rate of 10 for a 30- to 45-minute call. The calls usually take place after regular business hours or on weekends where the excessive PABX traffic will go on unnoticed and uninterrupted.

2 Q: How do hackers get the numbers? A: There are different methods of obtaining telephone codes: 1. "Dumpster divers," or the people who go through your trash and look for phone bills, computer printouts or product manuals. 2. "Shoulder surfers," those people who stand particularly close to you at a pay phone (in airports, bus terminals, etc.) while you dial your DISA password, voice mail code or calling card number so they can capture your dialing sequence. 3. Hackers publish their findings in magazines, BBS and even on the Internet. Q: What do they do with these codes once they have obtained them? A: Since the primary motive is money, they look for buyers. On the streets of New York City, for example, where 60 percent of PABX fraud attempts originate, a good number (or, in street slang, a "Montebello") will go for $3,000 to $5,000 depending on the supply/ demand at that time. Q: Why are PABXs a perfect target for these hackers? A: Today's PABXs are feature-rich, and more and more features are developed each day as the various PABX manufacturers attempt to gain a competitive edge. These features are all software, and therefore programmable, which in most cases means they can be accessed remotely. In addition, maintenance and service is provided by interconnects from remote service centers via modem lines. All of this creates a very familiar environment for the hacker to operate in with very little risk of being identified. Q: What are hackers looking for in your PBX? A: The easiest vehicle for them is to gain control of your direct inward service access (DISA) where a remote user can gain access to an outside line from your PBX by punching some "long" authorization codes. Most companies use it for the travelling employee. Second, they would love to "take over" your maintenance port. By controlling that port, which is the heart of your PBX, they can do whatever they want, including changing your routings and passwords and deleting/adding extensions. And, if their intent is vicious, they can actually shut down your PBX and take you out of business. Voice mail is probably the most popular vehicle of PABX fraud these days. Like PABXs, voice mail systems are also very sophisticated and full of features. You can, among other things, sit on the beach in the Caribbean and program your voice mail box in Chicago to place any inbound call on temporary hold, grab another line, call your cellular phone then conference the two lines--all within seconds. Meanwhile, the caller has no idea that you are actually enjoying the sun and sipping Jamaican rum. Hackers want to use exactly that feature to forward calls to a "phantom" mail box that will give just a dial tone. Then, they dial the rest from any public phone in Miami, Dallas or Amsterdam. Another kind of voice mail hacking involves changing the greeting in an "orphan" mail box to a simple greeting, which may consist of 10 seconds of silence followed by, "Yes, operator, I will accept the charges." The hacker can then dial "0" from any

3 pay phone, tell the long-distance operator he or she would like to call London, and charge the call to a "third party" which is "the hacker's" company at extension 777. When the operator calls that number and asks to be transferred to extension 777, his/her 10-second inquiry ("This is the long-distance operator. Mr. Joe Brown is calling London, will you accept the charges?") will be accepted by the well-timed, pre-recorded fraudulent greeting. Q: What can be done to combat fraud? A: The following are some basic steps you might want to consider adopting in the fight against PABX fraud: Education: First, get yourself and your immediate staff acquainted with toll fraud. Periodically remind all employees who have been issued authorization codes (DISA, voice mail, etc.) of the importance of keeping these codes secret and the need to change them frequently. Also, warn all employees about "shoulder surfers" and advise them not to write their codes in public or yell them out in a crowded area. Second, educate yourself with the many features of your PABX, voice mail and/or ACD. Shut down all of those not in use or not in service, and change your PBX passwords as frequently as possible. Ports: Install a "dial back" modem on your maintenance port, and always have your service provider call you before accessing your PABX. Block: Block access to destinations where your company does not do business. If circumstances do not permit this, at least block calls to some or all of the 10 most popular fraud destinations (Google search). Voice Mail: Make sure your voice mail system is a "closed loop" and cannot be manipulated to get an outgoing dial tone. Check your valid mailbox list and delete any box that is no longer in service. Disconnect callers after three unsuccessful attempts at dialing their mailbox code. Instruct employees to change their voice mail passwords and delete "old" messages. Codes: Choose random. lengthy passwords (10 digits or more) and change them frequently to make it harder for hackers to discover them. Keep these codes in a safe place and never write them on the wall next to the PBX. DISA: Consider disconnecting DISA. If this feature is necessary, ensure that only those employees who have a real need for international calls will be allowed to use it. Telco Filtering: More and more companies are demanding, and being provided with, extra value services form their Telco providers. Filtering and Early warning permits the owner of the PABX to limit their cost exposure for this type of crime. PBX Fraud Frequently Asked Questions (information provided by TeleDesign Security Inc.) 1. When I get hacked, who is going to pay for the calls? Your company is responsible for all charges incurred on your system. Recent court decisions and filed tariffs make you, not the carrier, responsible for the security of your CBX/PCX system if you have not taken steps to protect your assets.

4 2. Who are these people and why are they stealing calls? Today, communication theft is perpetrated from remote distances by highly skilled, technologically sophisticated criminals who have little fear of being detected, let alone apprehended or prosecuted. These criminals conduct a growing business selling access to communications systems all over the country. 3. Why don't the carriers write off these charges? Today, fraudulent calls are placed over many different inter-exchange Carriers (IXC), each carrier must pay that portion of the call handled by them. When the call is placed to an international location the domestic carrier must pay the foreign carrier regardless of the fraud. Court cases divestiture and FCC rulings prevent carriers from writing off calls. You the end user control access to your systems. 4. Why is identifying or stopping the fraudulent calls the customer's responsibility? Only the customer can differentiate legitimate calls from fraudulent ones. The long distance carriers do not have access or permission to work on your CBX I PBX, the vehicle that hackers use most to conduct their activities. 5. How will the hacker find my system? 1) Criminals pay for a CBX I PBX maintenance port number and password. 2) Hackers 'scan' using auto-dialers to find systems equipped with modems. 3) Your Company's telephone directory listing or your 800 service advertising make you known to the hacker. 6. How do I justify the expense of corrective action when we have not suffered a loss? Past performance is not an accurate indicator of present threats. The equipment and the motivation to perpetrate this criminal activity did not exist more than a few years ago. Just imagine attempting to explain the United States freeway system to the early inventors of the railroad, or explain to a rural builder of windmills that the windmill would be an alternate energy source. Educate your Executive council about the pitfalls of not protecting your Corporate assets and enlist their support by implementing a Corporate policy on unauthorized access as your first step. 7. What is a PHREAKER? A Phreaker exploits the omission of security controls in your system that occurred during installation or repair. The Phreaker steals from your system with out the need to change any of your parameters. The only tools required to be a very good phreaker are patience and social engineering skills. 8. How does a hacker gain access to my system? Hackers use computerized calling programs, automatic dialers, and sophisticated software to break your systems security and pass codes. Hackers attempt to gain access in the following order:

5 1) Phone Mail I Voice Mail 2) Automated Attendant 3) Remote Access or Direct Inward Service Access (DSIA) 4) Remote Maintenance/ Administration Port. 9. Why is it important to protect my Maintenance/Administration Port? This is the most important port on your CBX I PBX system. Hackers gain access to your system software and control your Voice Mail, DISA and other CBX I PBX features through the maintenance port. 10. How do hacker know which CBX I PBX type and brand of Voice Mail I am using? Hackers identify the type of CBX/PBX by the Login procedure used for each system. They know the pass codes for each vendor CBX I PBX. hackers also recognize the various Voice Mail and Phon systems by the default digitized voice recordings. 11. How does a hacker use my Voice Mail? 1) Through your Voice Mail the hacker is able to use your CBX I PBX "trunk-totrunk connections" feature to access your long distance network. 2) Your Voice Mail might also be used as a "bulletin board" to distribute stolen credit card and other hacker related information. 3) They may change your greeting to "Hello!...pause...Yes, I'll accept the charges to Zaire." 12. I understand why a larger user must be concerned, but I'm a small business in a rural community. Why should hacker activity concern me? Hackers use auto-dialers to search entire area codes to find systems to hack, they do not care who or where their victims are. No one is safe, and smaller companies may be less able to absorb the average loss ranging from $10,000 to $80,000 per incident. 13. What happens when a hacker finds my Maintenance I Administration Port? Hackers use manufacturers default passwords or computer generated, craker programs until they find a usable password. They then enter a system unlawfully and make software changes that allow unauthorized calls. Information on how to use your altered system is then sold to "call sell operators" who sell calls over your system to whomever wishes to place calls. These calls are typically made from public telephones (pay phones) in large metropolitan cities. 14. What is FAX back fraud? The theft consisted of compromising a system set up to deliver FAX information. The system accepted incoming requests for catalogs, product information and investment opportunities. These request were stored with a call back number. During off peak hours the system delivers the requested information via a call back. The company sending out the information pays for the call. International tele-thieves requested information that in reality was transmitted to an international "Party Line", pay per call number. This number answered with Fax tone and threw the incoming message away. The thieve may request 100 copies of the information and attempts to collect

6 $3.95 per minute, plus the cost of the international call, from the unsuspecting victims. 15. What is different about this theft from other forms of fraudulent activity. There are three major differences with this case: 1) The call is processed as data, not voice. 2) An international organization is required to: find the victim, set up the call, collect the money and manage the administration in a foreign location. 3) The theft or scheme has migrated and expanded in form and severity. 16. What do you mean that it has migrated? When first discovered the theft required a victim to have FAX Back Service. The thieves then migrated to "looping through a CBX". Now they are using cheap throw away FAX machines and clip on fraud to attack everyone, even homes and apartment buildings. The thief places an incoming call from Germany to US to a target system. They dial out of that system to the "Pay per call" number in a foreign country. They do not need FAX back service and in control of the origin and termination of the call. This scam has resulted in bills of up to $80,000 being incurred by victims in a week end. Criminals are buying cheap battery powered FAX machines and clipping them on to exposed telephone wires. They call the international number and charge a $400 to $500 dollar call to the victim. 17. What can we do to protect ourselves from these crooks and con artists? As with your personal lives, the better informed you are to the risks the better protected you are. Stay on top of the threats and form "A NEIGHBORHOOD WATCH" team that includes; a current policy on security, a secure system configuration, your Long Distance Carrier and a team approach to security and service with your equipment vendor. Do not let management or your Company be taken by surprise. This is one disaster that is very predictable and equally preventable. Remember that you will be a victim. You control the severity of the attack. In 1995 the Department of Defense conducted Tiger Team Attacks and out of 8,932 attempted break-ins, 393 were discovered and only 86 were stopped. Hackers and Phreakers are much easier to stop from breaking in than they are to evict. Insist on seeing evidence that your Long Distance Carrier and your Local Exchange Carrier will join your team. The carrier must have an adequate plan to identify theft of service, a client education program and a plan to provide you with assistance beyond their control. How can I protect my PABX from this type of fraud? (Source - If DISA is not required ensure that it is disabled. If it is required, the people who supplied, or who are maintaining your system, understand the full functionality of the PABX and they can help in configuring DISA properly.

7 Toll Fraud Audit, this service is provided by your PABX supplier or maintenance company, however, there is a cost involved. If automatic logging of calls is available, enable it. It may help in identifying the extensions number being used to compromise the PABX and it may also identify the source of the external call. Regularly check the log records for repeated short duration calls to the same number. This could be an indication of an attempt to attack your system. PIN's for voic , DISA and engineering access should, if enabled, be activated and changed regularly. If possible engineering access should only be permitted on a 'call back' basis, this will prevent unauthorised access to this privileged account. 18. What should you do in the event of a PABX/PBX Fraud PABX Frauds are a crime and should be reported to the complainant's local Garda Station. You should take a statement from the injured party to outline the following 1. Make and model of the PABX. - Name of Installer, Service and Maintenance Agents and contact details. - Name of Telco providers, both Incoming and Outgoing. - Details of the incident, When, No. of calls (list of repetitive Tel No.), Amount, Any incoming Tel No s. recorded. - List of Tel No s used for incoming calls. - How incident occurred, if known and how this information was established. - Establish any time difference between actual time and the PABX time. - Attach printout of outgoing call details. 2. Record incident on PULSE 3. Advise the complainant that they should have a complete independent audit of their telephone system in an effort to identify the manner of the hack and any evidence which may identify the suspect. 4. Foreign Outgoing Tel No s should be passed, via Interpol, to the appropriate authorities. Where there is a large volume of calls made, to a small number of telephone numbers, it is highly probable that Premium Rate Numbers are being used. It must also be kept in mind that just because a number may indicate a certain jurisdiction, Global Telco providers can terminate the number in another jurisdiction and this is known as short stopping. ComReg (Communications Regulator) are very good at tracing where call are being terminated and by whom. 5. Request Crime & Security for all Incoming Tel No s to the complainant s telephone number (Local, National and International). It is possible that the victim uses a number of telephone lines for incoming calls, all of them will have to be identified. It is highly probable that the calls originated from International numbers. 6. If access has been obtained through the Internet, IP (Internet Protocol) addresses may have been recorded. 7. Payment of the bill is not a Garda matter, the victim must inform their provider of the fraud and may require some proof that a complaint has been made. It is not a matter for the Gardaí to negotiate with the provider. Recent EU directives on Inflated Traffic through Fraud come under the remit of ComReg and if the incident is reported to them they can issue directives to Irish Telco providers. 8. Assistance can be obtained from the Garda Cyber Crime Bureau at

PBX Fraud Information

PBX Fraud Information PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks

More information

Notice to our customers regarding Toll Fraud

Notice to our customers regarding Toll Fraud Notice to our customers regarding Toll Fraud - Beware of Toll Fraud. - Toll Fraud is a crime against you. Bizfon isn't responsible for your Toll Fraud. - You need to take steps to protect yourself from

More information

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are: Introduction to Telecom Fraud This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention. Three Major Categories of Telecom Fraud

More information

David Morrow. Preventing PBX Fraud. -basic steps to help secure your PBX. prevention will always be cheaper than cure

David Morrow. Preventing PBX Fraud. -basic steps to help secure your PBX. prevention will always be cheaper than cure David Morrow Preventing PBX Fraud -basic steps to help secure your PBX prevention will always be cheaper than cure Contents 1 About the Guide 3 2 What you need to know 3 3 What you need to Do 6 4 If you

More information

Technical Bulletin. Toll Fraud Reminder & Update

Technical Bulletin. Toll Fraud Reminder & Update 1 Technical Bulletin Bulletin Authorisation Detail Author Andrew Kenyon Authorisation Wilf Wood Date 24/01/2011 TB Number TB - 11001 Description Toll Fraud Reminder Toll Fraud Reminder & Update Toll fraud

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

Sprint Security Support Services for Schedule No. 11*

Sprint Security Support Services for Schedule No. 11* Sprint Security Support Services are designed to minimize the vulnerability of Sprint's voice services customers to certain outbound international and inbound domestic toll free communications fraud originating

More information

AT&T CLASSIC MAIL. Voice Messaging System Mailbox User Guide

AT&T CLASSIC MAIL. Voice Messaging System Mailbox User Guide AT&T CLASSIC MAIL Voice Messaging System Mailbox User Guide Copyright 1993 All Rights Reserved AT&T 585-321-101 Issue 1 December 1993 Notice Every effort was made to ensure that the information in this

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

IP Office 4.2 Embedded Voic Mailbox

IP Office 4.2 Embedded Voic Mailbox Embedded Voicemail Mailbox 15-604067 Issue 06a - (23 June 2008) 2008 AVAYA All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was complete and

More information

Best practices that can be used in reducing potential toll fraud risk include the following:

Best practices that can be used in reducing potential toll fraud risk include the following: .. >TECHNICAL SUPPORT. TECHNICAL BULLETIN. Norstar and BCM: Preventative Measures for Toll Fraud BULLETIN ID: 2009009392, Rev 1 PUBLISHED: 2009-03-18 STATUS: Active REGION: APAC CALA EMEA GC NA PRIORITY:

More information

Security Awareness. Chapter 2 Personal Security

Security Awareness. Chapter 2 Personal Security Security Awareness Chapter 2 Personal Security Objectives After completing this chapter, you should be able to do the following: Define what makes a weak password Describe the attacks against passwords

More information

VoIP Theft of Service Protecting Your Network. Introduction to VoIP Theft of Service. Meet our Expert Phone Power

VoIP Theft of Service Protecting Your Network. Introduction to VoIP Theft of Service. Meet our Expert Phone Power VoIP Theft of Service Protecting Your Network Introduction to VoIP Theft of Service The truth is you just aren t a phone company until you ve had a run-in with telecom fraud. VoIP fraud is a significant

More information

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

COMMON WAYS IDENTITY THEFT CAN HAPPEN: COMMON WAYS IDENTITY THEFT CAN HAPPEN: OLD FASHIONED STEALING / DUMPSTER DIVING Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit

More information

IP Office Embedded Voic User Guide (Intuity Mode)

IP Office Embedded Voic User Guide (Intuity Mode) Embedded Voicemail User Guide (Intuity Mode) 15-604067 Issue 10b Standard (12 December 2011) 2011 AVAYA All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in

More information

PARTNER Advanced Communications System (ACS)

PARTNER Advanced Communications System (ACS) PARTNER Advanced Communications System (ACS) Over 1 million systems sold IP Telephony Contact Centers Unified Communication Services Get the powerful communications capabilities your growing business needs

More information

Retail/Consumer Client Internet Banking Awareness and Education Program

Retail/Consumer Client Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 1) E-mail Risk... 3 2) Internet Risks... 4 3) Telephone

More information

WE SEE YOUR VOICE. SecureLogix We See Your Voice

WE SEE YOUR VOICE. SecureLogix We See Your Voice ETM SYSTEM WE SEE YOUR VOICE We know some important things about your enterprise things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and

More information

Modern IP Communication bears risks

Modern IP Communication bears risks Modern IP Communication bears risks How to protect your business telephony from cyber attacks Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure

More information

Protect Yourself From. Identify Theft

Protect Yourself From. Identify Theft Protect Yourself From Identify Theft What is Identity Theft? Identity theft occurs when someone uses another person identifying information without their permission in order to access resources, obtain

More information

Providing Continuous Customer Service since 1976

Providing Continuous Customer Service since 1976 1-800-344-6470 www.asuperiorcallcenter.com Providing Continuous Customer Service since 1976 Thank you for your interest! Please review our services, we have highlighted the applicable services for you

More information

Avaya one-x Mobile User Guide for Windows Mobile

Avaya one-x Mobile User Guide for Windows Mobile Avaya one-x Mobile User Guide for Windows Mobile 18-602903 Issue 2 December 2008 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

BUSINESS VOICE. Helping You Do More. Cloud PBX & SIP Trunking

BUSINESS VOICE. Helping You Do More. Cloud PBX & SIP Trunking BUSINESS VOICE Helping You Do More Cloud PBX & SIP Trunking STEP 1 Call Retrotel for a site visit. We will come at a specific time (not some 8 hour window). Grab your phone services bill. STEP 2 Pick the

More information

Protecting Your Business From Hackers

Protecting Your Business From Hackers Protecting Your Business From Hackers Technology Has Changed Real Estate Today, consumers have access to vast troves of information that enable them to make decisions faster than ever before Real estate

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

IP Office 6.1 Embedded Voic Mailbox User Guide

IP Office 6.1 Embedded Voic Mailbox User Guide Embedded Voicemail Mailbox User Guide 15-604067 Issue 08a - (18 August 2010) 2010 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

Welcome to Cogeco Home Phone. Extended Home Phone User Guide

Welcome to Cogeco Home Phone. Extended Home Phone User Guide Welcome to Cogeco Home Phone Extended Home Phone User Guide Thank you for choosing Cogeco Home Phone. We re looking forward to providing you with superior phone service for your home. By choosing Cogeco,

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

IP Office Release 7.0 IP Office Essential Edition - Quick Version Embedded Voic User Guide

IP Office Release 7.0 IP Office Essential Edition - Quick Version Embedded Voic User Guide IP Office Essential Edition - Quick Version Embedded Voicemail User Guide 15-604067 Issue 09a - (21 February 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure

More information

Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training

Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training Recognizing Fraud Staying Safe 2018 Information/Cyber Security Training Copyright Sage Data Security 2017-2018 All Rights Reserved Presented by: John H Rogers, CISSP Director of Advisory Services john.rogers@sagedatasecurity.com

More information

Internet Phone Service. Virtual Office. Auto-Attendant User Guide. Version TRY.VOIP

Internet Phone Service. Virtual Office. Auto-Attendant User Guide. Version TRY.VOIP Internet Phone Service Virtual Office Auto-Attendant User Guide Version 1.0 www.packet8.net 1.866.TRY.VOIP Contents Overview... 3 Understanding the Auto-Attendant... 3 Before you start... 3 Online management...

More information

SADOS VOIP Phone System User Guide

SADOS VOIP Phone System User Guide SADOS VOIP Phone System User Guide SADOS Communications LLC. 501 North Market Street Frederick, Maryland 21701 Copyright and Trademarks Software specifications are subject to change without notice. SADOS

More information

Rev oneclicktelecom.net

Rev oneclicktelecom.net Rev. 1.0.8 1 Copyright Notice Copyright 2014-2017 OneClick Telecom No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without

More information

Reducing Telecoms Fraud Losses

Reducing Telecoms Fraud Losses Reducing Telecoms Fraud Losses A Telsis White Paper Intelligence for Your Network Introduction According to the Communication Fraud Control Association (CFCA), fraud costs the telecoms industry 1.69% of

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunications costs Research firm IDC 1 has estimated that a VoIP system can reduce telephony-related expenses by 30%. Voice over Internet Protocol (VoIP) has become a viable solution

More information

WELCOME GUIDE All you need to know!

WELCOME GUIDE All you need to know! TM TM WELCOME GUIDE All you need to know! Customer Care Centre: 1300 731 048 www.mynetfone.com.au support@mynetfone.com.au 2017_12 Welcome_Guide_2017_FINISHED.indd 1 Notes Welcome to MyNetFone Here are

More information

Six Questions to Answer When Buying a Phone System

Six Questions to Answer When Buying a Phone System NEW PHONE SYSTEM BUYER S GUIDE Six Questions to Answer When Buying a Phone System In addition to the most comprehensive portfolio of voice communications, data and wireless networking products in the industry,

More information

IP Office Intuity Mailbox Mode User Guide

IP Office Intuity Mailbox Mode User Guide Intuity Mailbox Mode User Guide 15-601130 EN-S Issue 12b - (03 October 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

Wire Fraud Begins to Hammer the Construction Industry

Wire Fraud Begins to Hammer the Construction Industry Wire Fraud Begins to Hammer the Construction Industry Cybercriminals are adding new housing construction to their fraud landscape and likely on a wide scale. Created and published by: Thomas W. Cronkright

More information

YADTEL - Privacy Information INFORMATION WE COLLECT

YADTEL - Privacy Information INFORMATION WE COLLECT YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

Keys to a more secure data environment

Keys to a more secure data environment Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting

More information

Avaya one-x Mobile User Guide for Palm Treo

Avaya one-x Mobile User Guide for Palm Treo Avaya one-x Mobile User Guide for Palm Treo 18-602149 Issue 2 December 2008 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

HOW TO CHOOSE THE RIGHT PHONE SYSTEM FOR YOUR BUSINESS

HOW TO CHOOSE THE RIGHT PHONE SYSTEM FOR YOUR BUSINESS PBX BUYING GUIDE HOW TO CHOOSE THE RIGHT PHONE SYSTEM FOR YOUR BUSINESS While moving to an IP phone system will bring great advantages, the more options, features, functions and capabilities that are available,

More information

KX-TD816-7 KX-TD1232-7

KX-TD816-7 KX-TD1232-7 DIGITAL SUPER HYBRID TELEPHONE SYSTEM KX-TD16-7 KX-TD1232-7 XDP E X TRA D EVICE P ORT CALLER ID DISPLAY T1 and ISDN-PRI COMPATIBLE AUTOMATIC ROUTE SELECTION 2-WAY DIRECT INWARD DIAL (DIOD) Digital Systems

More information

Avaya one-x Mobile User Guide for iphone

Avaya one-x Mobile User Guide for iphone Avaya one-x Mobile User Guide for iphone 18-602788 Issue 2 December 2008 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was

More information

A SCALABLE, COST-EFFECTIVE SOLUTION ENABLING BETTER COMMUNICATIONS

A SCALABLE, COST-EFFECTIVE SOLUTION ENABLING BETTER COMMUNICATIONS BUSINESS TRUNKS A SCALABLE, COST-EFFECTIVE SOLUTION ENABLING BETTER COMMUNICATIONS Welcome to Comcast Business Trunks. We are pleased that you have selected Comcast as your voice provider, and look forward

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS In order to better assist you with the transition to our new home banking service, we wanted to provide you with a list of anticipated questions and things that may need your

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

Rev

Rev Rev. 1.1.3 Copyright Notice Copyright 2014-2017 Telinta Inc. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO The BUSINESS of Fraud. Don t let it put you out of business. Veenindra J. Singh, First Vice President, Treasury Management Consultant California Bank & Trust 300 Lakeside Drive, Suite 800 Oakland, Ca 94612

More information

Residential. Telephone. User Guide

Residential. Telephone. User Guide Residential Telephone User Guide WELCOME Welcome to Allamakee Clayton Electric Cooperative. We are pleased to provide you with our quality service and support. We value relationships with our customers

More information

Service User Manual. a service of

Service User Manual. a service of Service User Manual a service of 1 The following are simple instructions and suggestions on how to better utilize your Digital Phone service from Citynet. Should you need further assistance, do not hesitate

More information

Telecommunications Glossary

Telecommunications Glossary Telecommunications Glossary API - Application Programming Interface. An API allows two applications to communicate. It's what enables data to be seamlessly distributed to different applications on different

More information

South Central Power Stop Scams

South Central Power Stop Scams Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.

More information

ATTENDANT USER GUIDE

ATTENDANT USER GUIDE ATTENDANT USER GUIDE NOTICE THIS DOCUMENT IS PROVIDED TO YOU FOR INFORMATIONAL PURPOSES ONLY. The information contained in this document is believed by Mitel Networks to be accurate as of the date of its

More information

PRIVACY POLICY QUICK GUIDE TO CONTENTS

PRIVACY POLICY QUICK GUIDE TO CONTENTS PRIVACY POLICY This privacy policy describes the policies and practices of Comodo Security Solutions, Inc. and Comodo Security Solutions Ltd. (collectively and individually referred to herein as "Comodo"),

More information

Avaya one-x Mobile User Guide for iphone

Avaya one-x Mobile User Guide for iphone Avaya one-x Mobile User Guide for iphone 18-602788EN-GB Issue 1 February 2008 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

Quick Resource for Crexendo Home Office Suite

Quick Resource for Crexendo Home Office Suite Crexendo Business Solutions Inc. Quick Resource for Crexendo Home Office Suite Crexendo QuickStart Guide 1 Crexendo QuickStart Guide Crexendo Business Solutions Inc. Getting Started Adaptor Installation

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information

CentraNet CustoPAK USER GUIDE. Telephone Number. Verizon Telephone Number. Switch Type: GTD-5 5ESS DMS 100 DMS 10

CentraNet CustoPAK USER GUIDE. Telephone Number. Verizon Telephone Number. Switch Type: GTD-5 5ESS DMS 100 DMS 10 CentraNet CustoPAK USER GUIDE Telephone Number Verizon Telephone Number Switch Type: GTD-5 5ESS DMS 100 DMS 10 INSIDE FRONT COVER Thank You for Selecting Verizon CentraNet CustoPAK Service. 1 Table of

More information

IP Office and 5601 User Guide

IP Office and 5601 User Guide IP Office 3.2 4601 and 5601 User Guide [15-601078] Issue [3] (1 June 2006) 2006 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering

More information

TOLL FRAUD POLICY. Toll Fraud. Liability

TOLL FRAUD POLICY. Toll Fraud. Liability TOLL FRAUD POLICY This Toll Fraud policy defines toll fraud and specifies actions the Customer and Farmers Mutual Telephone Company (FMTC) will take to address such fraud. Toll Fraud Toll Fraud is the

More information

Crexendo QuickStart Guide Crexendo Cloud Communications Questions? Call

Crexendo QuickStart Guide Crexendo Cloud Communications Questions? Call Getting Started Logging In To log into the Crexendo Web Interface, open http://www.crexendo.net and click the Login link in the far upper right corner of the screen. The next screen you see will be the

More information

CORTELCO 2700 Single-Line / Multi-Feature Set. Instruction Manual

CORTELCO 2700 Single-Line / Multi-Feature Set. Instruction Manual CORTELCO 2700 Single-Line / Multi-Feature Set Instruction Manual 1 Table of Contents Why VoiceManager SM with Cortelco Phones?... 2 Cortelco 2700 Set Features... 3 Telephone Set Part Identification...

More information

Mobile / Smart Phone Policy

Mobile / Smart Phone Policy Mobile / Smart Phone Policy Policy reviewed by: Philippa Mills Review date: September 2017 Next review date: September 2018 School refers to Cambridge International School; parents refers to parents, guardians

More information

WEBSITE PRIVACY POLICY

WEBSITE PRIVACY POLICY WEBSITE PRIVACY POLICY INTRODUCTION Welcome to the Octopus Group s privacy policy ( Privacy Policy ) Octopus Group respects your privacy and is committed doing the right thing when it comes to protecting

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Avaya Communications Process Manager Release 2.2 Web Portal Help for Non-administrative Users

Avaya Communications Process Manager Release 2.2 Web Portal Help for Non-administrative Users Avaya Communications Process Manager Release 2.2 Web Portal Help for Non-administrative Users Document No. 04-601161 August 2008 Issue 12 2008 Avaya Inc. All Rights Reserved. Notice While reasonable efforts

More information

Welcome Guide for KT Series Token

Welcome Guide for KT Series Token Welcome Guide for KT Series Token Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

Dunbarton Telephone Company, Inc. Section 2 Product Catalog Definitions of Terms Original Page 1 Effective Date: December 22, 2014 DEFINITION OF TERMS

Dunbarton Telephone Company, Inc. Section 2 Product Catalog Definitions of Terms Original Page 1 Effective Date: December 22, 2014 DEFINITION OF TERMS Product Catalog Definitions of Terms Original Page 1 DEFINITION OF TERMS Listed below are clauses or sentences defining various terms used in this Product Catalog. Accessories Devices, other than customer-provided

More information

PCI DSS Compliance for Healthcare

PCI DSS Compliance for Healthcare PCI DSS Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches

More information

Service Provider View of Cyber Security. July 2017

Service Provider View of Cyber Security. July 2017 Service Provider View of Cyber Security July 2017 Quick Stats Caribbean and LatAm: 3 rd largest population of Internet Users You Are Here Visualization from the Opte Project of the various routes through

More information

Unified Communications Manager Express Toll Fraud Prevention

Unified Communications Manager Express Toll Fraud Prevention Unified Communications Manager Express Toll Fraud Prevention Document ID: 107626 Contents Introduction Prerequisites Requirements Components Used Conventions Overview Internal vs. External Threats Toll

More information

AXXESSORY Talk TM Voice Processing provides information about the message you are recording and direct access to recording options.

AXXESSORY Talk TM Voice Processing provides information about the message you are recording and direct access to recording options. AXXESSTM An active outside call is displayed along with call duration and approximate call cost. Inter-Tel AXXESS supports Caller I.D. with directory look-up. The system can display a phone number or company

More information

A (sample) computerized system for publishing the daily currency exchange rates

A (sample) computerized system for publishing the daily currency exchange rates A (sample) computerized system for publishing the daily currency exchange rates The Treasury Department has constructed a computerized system that publishes the daily exchange rates of the local currency

More information

CyberArk Privileged Threat Analytics

CyberArk Privileged Threat Analytics CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical

More information

National Travel Associates

National Travel Associates National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of

More information

Credit Card Frauds Sept.08, 2016

Credit Card Frauds Sept.08, 2016 Credit Card Frauds Sept.08, 2016 Definitions Credit Card A card allowing the holder to purchasing goods or services on credit Debit Card A card allowing transfer of money from a bank a/c electronically

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

System administration quick reference guide Norstar MICS, CICS, & Call Pilot Systems.

System administration quick reference guide Norstar MICS, CICS, & Call Pilot Systems. Norstar system administration guide 3-digit extensions Version 7.2 Dec 07 This administrator guide is intended to assist system administrators with day to day programming such as adds, moves, and changes.

More information

Phishing: When is the Enemy

Phishing: When  is the Enemy Phishing: When E-mail is the Enemy Phishing, once only a consumer worry, is creating headaches for e-mail administrators as businesses become the next target. CONTENTS Understanding the Enemy 2 Three Things

More information

HOMEOWNER SECURITY PROCEDURES for allowing gate entry to guests & contractors

HOMEOWNER SECURITY PROCEDURES for allowing gate entry to guests & contractors NEW! IMPROVED! HOMEOWNER SECURITY PROCEDURES for allowing gate entry to guests & contractors CONTENTS Page Overview of New System 2 OPTION A : For Internet Users OPTION B : For Non-Internet Users 4 8 Frequently

More information

IP Office and 5602 User Guide

IP Office and 5602 User Guide IP Office 3.2 4602 and 5602 User Guide [15-601079] Issue [3] (6 June 2006) 2006 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

IP Office. IP Office Mailbox Mode User Guide Issue 11b - (15 May 2010)

IP Office. IP Office Mailbox Mode User Guide Issue 11b - (15 May 2010) Mailbox Mode User Guide 15-601131 Issue 11b - (15 May 2010) 2010 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and

More information

CPNI. Eileen Bodamer

CPNI. Eileen Bodamer CPNI Compliance Training Eileen Bodamer 770-649-1886 Eileen@Bodamer.com CPNI Defined Customer Proprietary Network Information ( CPNI ) is broadly defined as the data collected by telecommunications providers

More information

Allworx User s Guide (Release x)

Allworx User s Guide (Release x) Allworx User s Guide (Release 6.8.1.x) -PAGE INTENTIONALLY LEFT BLANK- Table of Contents 1 VOICEMAIL...1 1.1 ACCESSING YOUR MESSAGE CENTER INBOX...1 1.2 LISTENING TO YOUR VOICEMAIL...2 1.3 SENDING VOICEMAIL

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

FlexIP SOLUTIONS FEATURES

FlexIP SOLUTIONS FEATURES FlexIP SOLUTIONS FEATURES INTERESTED IN LEARNING HOW OUR PROVEN SOFTWARE PLATFORM CAN REVITALIZE YOUR BUSINESS COMMUNICATIONS? With FlexIP, we give you the tools and features you need to enhance your business

More information

Home Phone Quick Start Guide. Review these helpful instructions to understand your Midco home phone service and its many convenient features.

Home Phone Quick Start Guide. Review these helpful instructions to understand your Midco home phone service and its many convenient features. Home Phone Quick Start Guide Review these helpful instructions to understand your Midco home phone service and its many convenient features. 1 Staying Connected Has Never Been Easier Thank you for choosing

More information

HomePlan features and user guide

HomePlan features and user guide HomePlan features and user guide Effective 1 April 2013 Contents Important numbers to remember 1 How to make a call 2 Message Mailbox 5 Call Queue 12 Phone Divert 13 Three Party Calling 15 Toll Call Control

More information

VOICE PRODUCT SPECIFICATION

VOICE PRODUCT SPECIFICATION VOICE PRODUCT SPECIFICATION Fixed Voice and Calling Version 1.1 February 2017 Spark Digital, a division of Spark New Zealand Trading Limited 2016 Spark Digital owns copyright and all other intellectual

More information

KX-TA624 THE SPECIAL EDITION THE PERFECT SYSTEM FOR ALL OF YOUR HOME / HOME OFFICE AND BUSINESS APPLICATIONS

KX-TA624 THE SPECIAL EDITION THE PERFECT SYSTEM FOR ALL OF YOUR HOME / HOME OFFICE AND BUSINESS APPLICATIONS TECH TALK COMMUNICATION SYSTEMS DIVISION OCTOBER 1998 THE KX-TA624 SPECIAL EDITION THE PERFECT SYSTEM FOR ALL OF YOUR HOME / HOME OFFICE AND BUSINESS APPLICATIONS Do You Have The Talent To Sell Anything

More information

Identity Theft Victim s Complaint and Affidavit

Identity Theft Victim s Complaint and Affidavit Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information