We spend more time online than ever, and such was the case even before a certain worldwide event shook up how most industries needed to operate. Cybercrime is consistently rampant, which means that individuals and companies alike need to keep their “street smarts” regularly polished as new threats emerge and evolve. With cloud-based VoIP communications becoming the new standard, it’s important to be aware that telecom fraud isn’t going anywhere. But just what are the most common telecom threats out there nowadays?
Let’s explore in more detail.
GSM Gateway Fraud
Otherwise known as an interconnect bypass, this is where call traffic is shuffled from one network to that of another carrier without authorization. It’s a tactic employed to, as the term implies, bypass international calling fees, disguising the call as a domestic one. A commonly associated issue with this form of fraud is the parties responsible for this shuffle will sell long-distance calling cards internationally, which seriously eats into carrier finances.
Call Forwarding Fraud
Call forwarding fraud happens when a PBX system is hacked, harnessing integrated IVR and DTMF signaling capabilities to redirect long-distance calls to phony numbers. This can result in extremely high bills for the company in question, but it can easily be spotted in the form of sudden increases in high-cost destination number calls. With advanced, multi-layer security that actively monitors and regulates network traffic, you can better protect your operations.
FAS
The red flag indicating FAS fraud is a call that is terminated quickly by the caller. Short for False Answer Supervision, this is when the answer signal generated on a call is jerry-rigged so that you are charged for call time even when not having a conversation. There are three common approaches to FAS, the first being where a customer answering doesn’t trigger the return of the answer signal, but rather when the phone starts ringing. This causes calling fees to spike. The second approach, however, is riskier in terms of call security, involving the rerouting of a call to an external voicemail, which keeps the caller on the line and racking up their phone bill. Lastly, there’s a form of FAS where, after a recipient hangs up, the caller is billed until they disconnect as well.
No matter how secure your solution is (and it ought to be similar to Fort Knox in execution if using carrier-grade architecture and advanced multi-layered security), telephony fraudsters still exist. Our cloud-based VoIP at DirectNet utilizes these technological innovations in addition to state-of-the-art fraud security, protecting you and your customers while safeguarding your communications budget. Implement a proactive new standard by contacting our team today.
Leave A Comment