Community Banking , General Business Advice , Voicemail
Are There Security Risks with a Voicemail System
written by Chris Griesemer
Most people don’t think about voicemail at work being a high risk piece of technology. What risks could possibly be involved with voicemail? Maybe you have a client that leaves his/her name and phone number? At the very worst you might have a client who leaves name, phone number and social security number. Let’s really go out on a limb. Your customer is late on a payment, calls after work, goes to voicemail, leaves name, phone number, social security number and credit card number including expiration date. And although we all discourage this kind of information being left as a message to someone, it is really only a vulnerability if someone has hacked into the voicemail system, snooping voicemail boxes and listening to messages.
Weak Link
Believe it or not, voicemail is one of the weakest links into a company. It might not connect with the entire network but it can allow someone through the virtual front door. So what can a hacker do with a voicemail system if they get in? Below I will illustrate, from a hacker's standpoint, how easy it is to commit voicemail system fraud.
How it's Done
The first thing I do is find a company who closes at 5 and then turns their automatic attendant on. For those who don’t know, the automatic attendant is the system that answers calls after hours. It allows callers to have the ability to leave messages for someone at that business at anytime. It also allows employees of that business to call into the system and check their messages on voicemail.
Usually by pressing a button, the voicemail system will bring up an menu that allow employees to gain access to the voicemail system. By the way, that button is usually star ( * ) or pound ( # ). The first time I called, I would not press the bypass button, instead I would go to the directory in an attempt to find the extensions of the people that work there. I would get about 5 extensions. Then I would hang up.
Next I would call back and this time I would press the bypass button (either star or pound) and gain access to the voice mail system. I would attempt to access one of the mail box numbers and when it asked what the password is, I would enter that number again. If that didn’t work I would enter 1234 or 9999.
If I got in, I would do one of two things: If available, I would utilize Pass-Through dialing, which would allow me to make calls from this company's phone system. If that feature was not available, I would forward multiple extensions to different numbers of my choosing.
What kind of number would I have these companies dial? You guessed it, a 900 number that I setup in a different country non-traceable to me. A number that, when called, would charge the caller a price per minute and would be deposited into an account I would access later.
If I was really crafty I would go through as many voicemail boxes as possible and look for the ones that had an excessive amount of voicemail messages. More than likely these employees are no longer working there and more difficult for the company to find who is making the calls.
Pretty sneaky huh? Of course customer information is important but there are other risks involved.
Best Practices
So what can be done to make sure this doesn’t happen to your business? Here are some best practices:
- Make sure all voicemail boxes have unique passwords.
- Change passwords throughout the year.
- Disable the pass-through feature so calls cannot be made from your voicemail account.
- Remove users mailboxes who no longer work at your business.
- Block the ability to dial 900 numbers and any other number in which the company can be charged.
- Block international calling to only locations the business has customers.
- If you have to have the call forwarding feature, periodically run reports verifying valid call forwarding numbers.
If you are still uncertain or have questions, please feel free to contact Chris Griesemer at 417.881.0145.
View Similar Blogs
Other blogs about cybersecurity and your business
Regulatory Bank Exam: Anti-Money Laundering (AML)/Bank Secrecy Act (BSA) Compliance Program Checklist
Navigating the complex landscape of AML/BSA compliance represents a critical task for any community bank. With evolving regulations and stringent oversight, preparing for a regulatory bank exam can...Complete Guide to Outsourced CFO Services From The Whitlock Co.
An outsourced CFO can make a huge difference in your company’s financial planning and long-term growth. This is when you hire an expert to act as your CFO rather than hiring a full-time chief...Comprehensive Guide to the Tax Services Provided by The Whitlock Co.
Tax services encompass more than just filing returns. The Whitlock Co. can identify deductions, credits, and planning opportunities tailored to the unique needs of your business. You could have a...