FAQ Category: Voice Security Archives

Eavesdropping is the intentional act of secretly or stealthily listening to the private conversation or communications of others without their consent. Telecom Metric uses the SRTP protocol to provide media encryption and message authentication for both the phone’s network as well as trunking. This protects clients from replay (man-in-the-middle) and eavesdropping attacks.

Learn More:

DDoS (Distributed Denial of Service) is an attempt to exhaust the resources available to a network, application, or service so that genuine users cannot gain access. These attacks are designed to basically take down a network, at least temporarily, making it difficult if not impossible for the network to function as it was designed to do. Hackers will launch DDoS attacks for a number of reasons including:

  • To extort money
  • To damage the brand and reputation of a business
  • To disrupt business services for customers

Learn More:

Most phone providers offer so called ‘endpoint protection’ where they encrypt the physical hardware such as your PBX system and desk phones. With Toll-fraud however, hackers use the outgoing SIP trunk network to reroute phone calls to take advantage of your minutes. This is often not monitored by your phone provider but by the owner of the SIP trunk, such as Bell and Broadsoft, and they charge you for those minutes.

TMI leverages it’s own independent nationwide SIP provider. Therefore we are able to set automatic thresholds to monitor your outbound calling. If you reach 20% of your average spending our technicians will check whether the outbound calls are suspicious in order to avoid toll-fraud. Most often calls to abnormal destinations cause unexpected costs when the phone is being hacked. Our technicians will also inform you when 80% of your normal maximum spending is reached. This assures that you never pay too much while we make sure that no one else uses your network.

Learn More:

Just like any other device connected to the internet, phones can be exploited by cybercriminals for financial gain. When a phone solution is not properly implemented, hackers can take advantage of vulnerabilities to launch an attack that can:

  • Compromise valuable business data and customer information
  • Commit extortion and fraud
  • Eavesdrop during private direct and boardroom conference calls

Telecom Metric Inc. actively monitors all layers of network traffic to prevent intruders from unauthorized access, DDoS attacks, Toll-fraud, and other common vulnerabilities.

Learn More:

Common attacks on phone systems are:

  • DDoS attacks to lock down the system
  • Toll-fraud for financial gain (stealing your minutes)
  • Eavesdropping to compromise important business information

Learn More: