Skip to main content

If your client is using a VoIP phone system, they are a HUGE target for hackers?

It’s incredibly hard to defend your system against employees clicking on phishing links that they shouldn’t be clicking on. Contact us to get a quality cyber policy for your clients.

How Does Telephone Hacking Occur?

Because VoIP sends calls directly through the same exact path that your network uses for internet and other traffic, your VoIP connections open your network to attack and exploitation. Hackers can sign up to lease premium-rate phone numbers (often used for sexual-chat or psychic lines), from web-based services that charge dialers over $1 a minute and give the lessee a cut. This type of attack is referred to as “Toll Fraud” but other common phone attacks include DDoS and Eavesdropping.
 
Claims Example: Architecture Firm
An Architecture Firm in Norcross, GA ran up a $166,000 phone bill in a single weekend. Hackers routed calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives. High speed computers allowed the hackers to make hundreds of calls simultaneously. The local police said there had been no progress in finding the hackers. The firm had no idea that this was a potential risk factor could seriously threaten the health of the business.
 
How Can I Make Sure My Client is Covered?
First ensure that your client has a cyber policy in place that includes first party crime coverage. Because this is unique type of hacking attack, you want to make sure that it is specifically listed in the policy wording. Many times it is referenced as “telephone hacking.” If you are looking to ensure that your client has quality coverage in place in the event of a telephone hacking attack, please contact Patrick Costello (contact info above) or click the quote button below.
 
 

Leave a Reply