Avaya MERLIN MAGIX Maintenance And Troubleshooting Manual page 198

Integrated system release 2.0 and earlier
Hide thumbs Also See for MERLIN MAGIX:
Table of Contents

Advertisement

Never distribute the office telephone directory to anyone outside the company; be careful
I
when discarding it (shred the directory).
Never accept collect telephone calls.
I
Never discuss your telephone system's numbering plan with anyone outside the company.
I
Educating Operators
Operators or attendants need to be especially aware of how to recognize and react to potential
hacker activity. To defend against toll fraud, operators should follow the guidelines below:
Establish procedures to counter social engineering. Social engineering is a con game that
I
hackers frequently use to obtain information that may help them gain access to your
communications system or voice messaging system.
When callers ask for assistance in placing outside or long-distance calls, ask for a callback
I
extension.
Verify the source. Ask callers claiming to be maintenance or service personnel for a callback
I
number. Never transfer to *10 without this verification. Never transfer to extension 900.
Remove the headset and/or handset when the console is not in use.
I
Detecting Toll Fraud
To detect toll fraud, users and operators should look for the following:
Lost voice mail messages, mailbox lockout, or altered greetings
I
Inability to log into voice mail
I
Inability to get an outside line
I
Foreign language callers
I
Frequent hang-ups
I
Touch-Tone sounds
I
Caller or employee complaints that the lines are busy
I
Increases in internal requests for assistance in making outbound calls (particularly
I
international calls or requests for dial tone)
Outsiders trying to obtain sensitive information
I
Callers claiming to be the "telephone" company
I
Sudden increase in wrong numbers
I
Establishing a Policy
As a safeguard against toll fraud, follow these guidelines for your MERLIN MAGIX Integrated
System and voice messaging system:
Customer Support Information
6
6
6
Other Security Hints
A-15

Advertisement

Table of Contents
loading

Table of Contents