Has Your VoIP System Been Hacked?

Each year, VoIP technology continues to gain in popularity among small businesses and large enterprises alike. Companies are choosing to use VoIP as a communications solution because of it’s scalability and affordability. Unfortunately, like all devices connected to the internet, VoIP systems can be hacked into and used to commit fraud, extortion, and a way to gain access to private information. If you have a VoIP phone system, how can you tell if you’ve been attacked? Here are five common indicators to look for.

Call History Irregularities
If your VoIP phone system has been hacked, you might find some irregularities within your call history. As you look through it, identify any calls that come from unknown numbers, or from areas you don’t conduct business with. Suspicious calls could be your first red flag and should not be ignored.

Unexpected Bill Increase
The second indication of a possible hack is a sudden and unexpected bill increase for no logical reason. Unauthorized use of your phone system could be the cause of the increase. Once inside the system, hackers can place long distance calls without you even knowing. For this reason, it’s important to check your call history daily or weekly to find the call irregularities as soon as possible.

Redirected Internet Searches
A lesser known and subtle sign of foul play occurring within your system is being redirected to unwanted sites when you enter a term in a search engine. You could also experience toolbars or extensions that get added in your browser without your knowledge. Always logging out of your admin portal and powering down your system when not in use could protect you against this threat.

Fake Antivirus Pop Ups
It’s important to have proper antivirus protection on your computers, but this is a sneaky way hackers gain access to your system. Fake antivirus adds can pop up on your screen, and if you click on them, it opens the door to an attack. If you see this type of pop up, don’t click on it, and notify your system administrator immediately so they can access whether it’s real or not. If you do click on it unknowingly, don’t try to fix it. Shut down your system and wait for your technical team to work on fixing the problem.

Automatic Activation on Webcams or Microphones
The last common indication of a compromised system is unwanted activation of webcams or microphones. Hackers like to use webcams and microphones to spy on businesses in order to collect private information. If you notice one of these is on and you didn’t turn it on yourself, alert your system administrator so they can run diagnostics to see if it has in fact been hacked.