PBX Security in the VoIP age
Computers & Technology → Technology
- Author Chris Mcandrew
- Published December 18, 2010
- Word count 558
PBX Security in the VoIP age
Once upon a time hackers hacked computers and cause the IT department varying
degrees of heartache.
And the corporate telecom manager implemented his corporate PBX Security policy
and locked the communications room door on his way home.
Then along came the Phreak and they started attacking long distance carriers.
And the corporate telecom manager slept quietly in his bed safe in the knowledge
that PBX Security meant locking the comms room door.
Then someone invented Voicemail and IVR systems.
Phreaks started to pay attention to corporate telephone systems.
And the telecom manager started to stir.
Now we have VoIP systems running on virtual servers, web facing collaboration
applications, home workers with SIP handsets and mobile phones which function as extensions linked over WiFi to your
telecommunications server.
Now we have Phreaks attacking DISA, Voicemail and IVR systems, we have hackers
attacking telecommunications servers and their associated web facing applications and to add insult to injury we have
penetration testers telling us that we have not secured our applications properly!
What went wrong?
Well that question, at least, is easy – we never thought it would happen to
us…….
Attacking telephone systems in the current day and age is now a multi billion
dollar industry (estimated $80 billion globally) attracting a lot more that bored school kids, the people perpetrating these
attacks are more likely to be a part of an organised crime or terrorist group.
So, PBX Security needs to come of age, quickly.
Businesses need to implement and adhere to, strict PBX Security policies,
locking down all unnecessary functions and applications. Telecom Managers need to stay up to date on the latest threats
being posed by these attacks.
A new report from the Communication Fraud Control Association has placed the UK
in the top 5 countries which are global fraud hotspots, joining the likes of Cuba and India.
PBX Security Best Practices
- Ensure your employees change the manufacturers’ default password immediately
upon being assigned a voicemail box and frequently thereafter.
- Programme your voice mail system to require passwords with a minimum of 6
characters (8 is preferred – the more complex the password, the more difficult it is to guess)
- Train your employees not to use easily-guessed passwords such as their phone
numbers, local number, simple number combinations or patterns.
- When assigning a phone to a new employee, never make the temporary password
the employee’s telephone number.
- If possible programme your voice mail system to force users to change their
password at least every 90 days. If not then introduce a corporate password policy which requires them to do so.
- If possible DISA should be disabled. DISA is a function which allows you to
make telephone calls through your telephone system when you are at an offsite location. If this feature is used, it is
important that you generate and monitor reports to ensure that it is not being abused.
- Remove all unassigned voice mailboxes
The above security measures are of a general nature and will not protect every
aspect of an individual telephone system – you should contact your system maintainer or specialist PBX Security Consultant.
Remember that you are responsible for paying for all calls originating from, and
charged calls accepted at, your telephone, regardless of who made or accepted them.
For further information visit http://www.chris-mcandrew.co.uk or
http://www.telecompages.co.nr
My name is Chris McAndrew and over the last 28 years I have worked on many PBXs, from Ambassadors to Mitel 3300s I have also received a few awards including Engineer Of The Year (2005) and one of my projects won the Comms Channel Awards in 2003.
I am currently employed as a tier 2 Mitel support engineer covering most aspects of the Mitel 3300 however my favourite areas are security and new technologies, currently things like SIP.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- How End Of Arm Tooling (EOAT) Enhances Productivity And Quality In Automotive Plastics
- Design Considerations For Injection Moulding: What You Need To Know Before Manufacturing
- Safety, Lifespan, And Performance: Key Considerations For Lithium Battery Use
- How Talent Management Software by Bullseye Engagement Transforms Workforce Performance
- Why Businesses Choose VALiNTRY to Hire Full Stack Expert Talent in 2026
- Australia’s Most Popular Taxi Dispatch Software Reviewed: Which One Truly Wins
- How AI Trends in 2026 Are Changing Gaming, Software, and Digital Access
- Microsoft Office 2026 Review: Why This New Perpetual Version Just Became My Go-To Tool in Early 2026
- The Evolution of Mobile App Development in the Age of Agentic AI and Generative Intelligence
- Understanding AI-Powered Security Awareness Training and Its Impact
- How Office Phone Systems Improve Customer Communication and Productivity
- Key Features of Powerful Executive Business Intelligence Dashboards
- Hire Top Cash Application Specialists to Improve Cash Flow and Reconciliation
- Professional SEO Services Boise to Boost Your Online Presence
- Streamline Payroll and HR with Professional Outsourced HR Payroll Services
- How HCM Software Improves Employee Performance and Engagement
- Challenges and Solutions in Slot Game Development
- How Staff Augmentation Salesforce Improves Operational Efficiency and Execution
- Why Businesses Should Hire Certified Petroleum Engineers for Oil and Gas Projects
- Why Most SaaS Products Fail at Onboarding (And How UI/UX Fixes It)
- ADP System Maintenance Services That Improve Workflow Efficiency
- Why Your Organization Needs a Training Management Software System
- MVP Mobile App Development: A Complete Technical Guide for Building Smarter, Faster, and Scalable Apps
- The Future of Work in the Age of AI
- Reducing Turnover and Burnout with Effective Healthcare Staffing Services
- Building a Leadership Pipeline With Advanced Succession Planning Tools
- Hire Petroleum Engineers Who Can Navigate Digital Transformation in Energy
- Top Benefits of Hiring a Data Warehouse Consulting Firm in 2026
- Mobile app development company in Qatar
- Protection Engineer Staffing Agency for Energy and Industrial Safety