The Information Security Specialists


War Dialling. Now there’s a blast from the past.

With all the focus on state of the art firewalls and perimeter security devices it is easy to over look the PABX telephone exchange as a source of a potential breach. Is there an unauthorised dial up modem connected to your network that can be accessed externally, or can someone gain access to the technical director’s voicemail?

These examples highlight a security breach but there are also operation breaches to consider. We have heard horror stories from clients that someone has managed to hack in to the PABX system and use this fraudulently to make international or premium rate calls, often leaving the company with a bill running into thousands or tens of thousands before it is identified as a problem. This really does highlight that prevention is far cheaper than cure.

Jump forward to look at recent developments and most companies are switching to Voice over IP (VoIP) because of efficiency and cost savings that are available. Simply replacing one technology with another does not remove the risks posed, it just introduces a different set that must be guarded against.

You still have the worry of protecting against voicemail hacking and fraudulent calls but now if a VoIP network is hacked it can provide another means by which to gain access to the corporate data network or the ability to monitor and redirect calls.

With VoIP there is also the threat of VLAN hopping if the network is poorly configured and any potential configuration, patching or published vulnerabilities that may affect the call server to consider.

One of the team is always willing to discuss any specific requirements or questions you might have so feel free to contact us.

English French German Italian Portuguese Russian Spanish
Call us now on
01634 721855

Latest News

I wish to highlight the outstanding work that your consultant undertook whilst doing the ICT Health Check for the Council.

View all Testimonials

Particularly notable was the level of technical knowledge displayed by NTA’s consultants, and we were also impressed that they were willing to share this knowledge with the network team.

View all Testimonials

We have found NTA to be an excellent supplier, offering a very good service at a competitive price. A key differentiator is that they are happy to answer any questions...

View all Testimonials

I have found NTA to be an approachable knowledgeable partner, and have no hesitation in recommending their services.

View all Testimonials

The NTA testing programme was a success on all fronts.

View all Testimonials

The quality of both the initial work and follow-up advice and guidance was excellent, and NTA provided full lifecycle support to the development and delivery of our Online Services portfolio.

View all Testimonials

On one occasion our third-party did not believe the vulnerability was an issue - having had their software tested by another well-known security testing company - and NTA Monitor were...

View all Testimonials

NTA Monitor are very supportive, especially regarding general questions about Information Security issues such as hacking and vulnerabilities.

View all Testimonials

NTA Monitor has been a trusted supplier for a number of years and we have found them to be approachable, helpful and understanding of our needs relating to information security.

View all Testimonials