System information

System Security and Toll Fraud
xxvi Issue 1 October 1997
Never use obvious or trivial passwords, such as your telephone extension,
room number, employee identification number, social security number, or
easily guessed numeric combinations (for example, 999999).
Change administered default passwords immediately; never skip the
password entry. Hackers find out defaults. To change your password,
press 5 at the main AUDIX menu. Then press 4.
Discourage the practice of writing down passwords, storing them, or
sharing them with others. If a password needs to be written down, keep it
in a secure place and never discard it while it is active.
Never program passwords onto auto dial buttons.
If you receive any strange AUDIX messages, or your greeting has been
changed, or if for any reason you suspect that your AUDIX facilities are
being used by someone else, contact Lucent Network Corporate Security.
INTUITY AUDIX Administration
To minimize the risk of unauthorized people using the INTUITY AUDIX system to
make toll calls, you can administer the AUDIX system in any of the following
ways.
Outcalling
When outcalling is used for subscribers who are off-site (often the message
notification is forwarded to a call pager number), three options exist to minimize
toll fraud: 1) the AUDIX voice ports can be assigned to a toll-restricted COR that
allows calling only within a local area; 2) the outcalling numbers can be entered
into an unrestricted calling list for either ARS or Toll Analysis, or 3) outcalling
numbers can be limited to 7 or 10 digits.
On the Subscriber form, turn off outcalling by using the proper COS for
each user.
On the System Parameters Outcalling form, limit the number of digits that
can be dialed for outcalling.
NOTE:
If outcalling is to a pager, additional digits may be required.
Mailbox Administration
To block break-in attempts, allow a low number of consecutive
unsuccessful attempts to log into a voice mailbox. Administer this on the
System Parameters Features screen.
Deactivate unassigned voice mailboxes. When an employee leaves the
company, remove the subscriber and, if necessary, reassign the voice
mailbox.