beautypg.com

Detecting toll fraud – AT&T MERLIN LEGEND 555-601-010ADD User Manual

Page 23

background image

Introduction

To enhance security for the outcalling feature, you can turn off outcalling on a per-
subscriber basis via the Subscriber Administration screen. You can also restrict the

number of digits that may be used for outcalling on a system-wide basis via the

Outcalling Administration screen. For more information, see the AT&T AUDIX Voice

Power™/AT&T FAX Attendant System™ Planning and Implementation document
(Document No. 555-601-202).

If your AUDIX Voice Power system is intended to serve only a subset of the

telephone system users, the remaining users may be administered as AUDIX Voice

Power subscribers with restricted mailboxes, so that the possibility of making

transfers to these users is ensured. Restricted mailboxes can be set up by

allocating minimal mailbox space (for example, 1 minute) to each of these
subscribers. Other subscribers may address messages to these users, but the
limited mailbox size will prevent most messages from being delivered.

Protecting your AUDIX Voice Power and FAX Attendant systems is a vital and
important part of your responsibility as a System Manager. You should take every

precaution to protect your company’s assets from both internal and external security
breaches. AT&T does not warrant that these products will prevent (and AT&T will
not be responsible for) unauthorized use (or charges for such use) of common

carrier telecommunication services or facilities accessed through (or connected to)
AUDIX Voice Power or FAX Attendant. The customer is responsible for
administering AUDIX Voice Power and FAX Attendant to prevent such unauthorized

use. Therefore, it is necessary that the person to whom the customer assigns this
responsibility read all documents associated with AUDIX Voice Power and FAX
Attendant and understand all features that enable the administrator to reduce

exposure to unauthorized use.

Detecting Toll Fraud

Once you have instituted the appropriate security measures, monitor call traffic for

the following signals of possible hacker activity:

Employees cannot get outside lines.

Customers have difficulty getting through to your 800 number.

Usage is higher than normal.

Heavy call volume on nights and weekends.

Operators report frequent hangups.

Telephone bill shows calls made to unusual places.

1-9