Common headlines these days are exposing the countless threats of Internet hackers. Businesses that utilize cloud-based phone systems operated via the web are often concerned with security and fraud protection.
Fortunately, major carriers like Broadview, have sophisticated fraud detection systems and protocols in place. A commonly reported scam or hack within business phone systems results from hackers calling into a phone system’s voicemail, trying different passwords until one works and making outbound calls via one of the voicemail menu options.
Broadview proudly addressed this concern many years ago with our award-winning OfficeSuite® Phone system by eliminating the rarely used call-out feature from our voicemail options all together.
Another commonly reported concern is overnight cleaning crews racking up costly international calls on company’s bills. With more advanced cloud-based phone systems, you have the ability to restrict outgoing calls, with the exception of emergency calls during after hours. Closed or after hours can be also defined however needed and vary by employee or group through the Business Hour function, regardless of how many different shifts you have. We also always recommend that our customers update their “permission profiles” by turning off any calling permissions that employees do not need or should not have, especially when their business is closed.
Although, our customers can rest easy knowing that their systems are secure, we recommend that everyone incorporate the following three practices to ensure optimal security for your business.
Change your passwords– Although it can be a pain to remember new passwords, it is a great measure to keep your system secure. We recommend changing your password at least once a year and choosing something that is difficult for others to guess. We offer our customers the option to have passwords that contain up to 10 digits, which are significantly harder for hackers to crack than four digit passwords.
Require Password Protected Logins– It may be quicker and easier for your employees to click the “keep me logged in” or “remember my password” buttons, but that’s also a great way to weaken your security. If you want to ensure optimal security for your network, require every username to have a password, and require the username and password to be entered every time the program is launched. This adds another layer of security – even if a hacker is able to breach the network, they’d still need to hack a specific password to gain full access.
Use Common Sense when Working Outside the Office– One of the greatest advantages of cloud-based systems is that you can work from anywhere. Just be sure to always use common sense. Don’t ever share your password with anyone, write it down and or store it on your personal computer or other devices. Theft of computers and devices is common, so ensuring that your passwords are protected is critically important.
No network is perfect, but when you utilize a cloud-based phone system that has the proper security and fraud protection in place and instill your own routine preventative security policies, your business will remain secure and be less susceptible to fraudulent threats