1. https://appdevelopermagazine.com/mobile-guidelines
  2. https://appdevelopermagazine.com/how-to-protect-ip-communications-from-telecom-fraud/
12/28/2017 8:03:24 AM
How to protect IP communications from telecom fraud
Telecom Fraud,Fraud Prevention,Fraud Detection
/Four-Tips-to-Safeguard-IP-Communications-From-Telecom-Fraud-App-Developer-Magazine_63v92w6e.jpg
App Developer Magazine
How to protect IP communications from telecom fraud

Mobile Guidelines

How to protect IP communications from telecom fraud


Thursday, December 28, 2017

William King William King

Business can avoid falling victim to fraud by partnering with their IP communications carriers to better understand what telecom fraud looks like and how it can be prevented.

Software-based IP communications continue to grow in popularity because of the added reliability, reach and control they allow businesses to have over their telecom resources. However, as more developers continue to transfer enterprise communications from legacy telcos to cloud-based service providers, the threat of telecom fraud and cyber-attacks also rise.
 
According to the Federal Trade Commission, telecom fraud continues to account for more and more consumer complaints each year. A single telecom fraud event can cost a company up to $3,000 to $50,000, having lasting detrimental effects to the company's customer relationships and ultimately its corporate reputation.
 
Fraudsters will often time attacks to occur during off-hours when employees are not in the office. This allows the fraudulent calls to go on for hours, running-up a hefty bill until the activity is detected and stopped. Scammers will often reroute calls from the company to numbers around the world, increasing costs by tacking on international fees.
 
Business can avoid falling victim to fraud by partnering with their IP communications carriers to better understand what telecom fraud looks like and how it can be prevented. Companies should consider the best practices below to help ensure enterprise networks and services stay protected.
 

1.) Spot fraud to avoid it


A main way to avoid fraud is to know how to identify it. Four commonly reported types of fraud include:

- Premium route fraud: which routes calls at premium rates, often to international destinations;

- Identity fraud: where hackers impersonate an individual or business, misattributing calls from their account. This fraud is also called caller ID spoofing and often includes voicemail hacking;

- Inbound toll-free fraud: which places a call and then plays unrecognizable audio on the line, forcing the call recipient to stay on the line longer (extending the call and costs) all while the call recipient ties to understand the situation;

- Black/grey routes: where fraudsters steal and resell SIP trunking accounts to provide inexpensive calls to specific countries or destinations.
 

2.) Set and define calling parameters


This includes setting a maximum default rate for outbound calls, and creating call limits in a destination whitelist. By setting a maximum outbound rate, the business has total control to block any calls that try to connect to a destination outside of the approved parameters. These parameters may differ for every company, and can be altered as calling needs and traffic patterns change. The destination whitelist acts as an exception to the rule-book, explicitly defining the destinations that can be called, regardless of predefined outbound rates. Defining countries on this list will set security parameters that prevent charges from accruing if there is a breach or the network is hacked.
 
In order to see successful results with both of these tools, it is important to assess the normal traffic that the account serves. This will define the rate cap and whitelist parameters that will best suit the company's requirements. The more selective companies are with setting their rates and parameters, the more effective they will be in preventing fraud attacks.
 

3.) Enable IP-based authentication for outbound calls


If a company's phone system has a static IP address, consider setting up verification filters for outbound calls as a way to further secure the account. This will restrict access to telephony resources from internal IP address, allowing only people within the authorized network to place calls or send messages.
 
If the network requires multiple mobile users logging on from dynamic IP addresses, consider creating a blacklist of IP addresses that have been identified as potential hackers. This can be done by utilizing a third party tool that will help monitor log files and automatically block IP addresses that are unfamiliar or have failed a certain number of password attempts. These efforts will help to create dynamic fraud protections for the network and account.
 

4.) Conduct security audits


If a business operates one or more PBX systems on public IP addresses, it is recommended that the company conduct an annual security audit of the system to ensure that fraud controls are still aligned with traffic patterns, reflects the company's risks and will not result in service interruptions. Annual audits will also protect the account from fraudsters roaming the web looking for susceptible targets.
 
Business can never place too much emphasis on fraud protection. Security is only as good as its weakest link; therefore, communications are only as safe as the cloud-based service provider can provide. If carriers are struggling to satisfy the requirements listed above, enterprises should consider reassessing providers to safeguard their customers and business. Having this proactive approach will keep the company a step ahead of fraudsters and potential threats. 





This content is made possible by a guest author, or sponsor; it is not written by and does not necessarily reflect the views of App Developer Magazine's editorial staff.

Subscribe to App Developer Magazine

Become a subscriber of App Developer Magazine for just $5.99 a month and take advantage of all these perks.

MEMBERS GET ACCESS TO

  • - Exclusive content from leaders in the industry
  • - Q&A articles from industry leaders
  • - Tips and tricks from the most successful developers weekly
  • - Monthly issues, including all 90+ back-issues since 2012
  • - Event discounts and early-bird signups
  • - Gain insight from top achievers in the app store
  • - Learn what tools to use, what SDK's to use, and more

    Subscribe here



Featured Stories


Multiple language options when developing apps with Evoke
Multiple language options when developing apps with Evoke Thursday, May 21, 2026


When Social Listening Becomes Social Surveillance
When Social Listening Becomes Social Surveillance Wednesday, May 20, 2026


Medical debt relief custom-built platform moopFi launches
Medical debt relief custom-built platform moopFi launches Tuesday, May 19, 2026




Quant Pros Say AI Is Widening the Skills Gap
Quant Pros Say AI Is Widening the Skills Gap Monday, May 18, 2026


Tether QVAC SDK Powers AI Across Devices and Platforms
Tether QVAC SDK Powers AI Across Devices and Platforms Wednesday, April 22, 2026


APAC 5G expansion to fuel 347B mobile market by 2030
APAC 5G expansion to fuel 347B mobile market by 2030 Tuesday, April 21, 2026


How AI is causing app litter everywhere
How AI is causing app litter everywhere Tuesday, April 21, 2026


The App Economy Is Thriving
The App Economy Is Thriving Monday, April 20, 2026


NIKKE 3.5 anniversary update livestream coming soon
NIKKE 3.5 anniversary update livestream coming soon Friday, April 17, 2026


New AI tool targets early dementia detection
New AI tool targets early dementia detection Thursday, April 16, 2026


Stay Updated

Sign up for our newsletter for the headlines delivered to you

SuccessFull SignUp

Get More App News



/sites/themes/prod/assets/js/less.js"> ' ' %>