Analysis and Alerts
A large number of companies have already suffered from phreaking attacks. These attacks consist in fraudulently breaking into your telephone system to modify certain parameters and to send traffic to exotic and expensive destinations at your expense.
Depending on the size of your installation and the length of time the attack continues without intervention, the additional cost generated by these calls can reach several tens of thousands of dollars.
CIOs can put in place a few simple management rules but also equip themselves with control tools adapted to the detection of such offences such as AUDITELcom.