Instruction manual
Issue 9 May 2003 4-1
4
Security risks
NOTE:
Unless specifically stated otherwise, references in this document to “G3Vx 
and later” include the specified DEFINITY G3 (and more recent) versions, 
DEFINITY ECS, MultiVantage™ Software, and Communication Manager.
Overview
In order for your system to be secure against toll fraud, you need to address 
access, egress, and system administration. This handbook addresses those 
concerns. In addition, the risk of PBX-based toll fraud increases when any of the 
following products and features are used:
■ Remote Access
■ Automated Attendant
■ Other port security risks
■ Voice Messaging
■ Administration and maintenance access
■ Vectors associated with the DEFINITY ECS and DEFINITY 
communications systems
All these features offer benefits which allow companies to increase their 
availability to their customers and the productivity of their workforce. However, this 
chapter takes a look at these features from a different point-of-view: how can 
these features, when combined with other outgoing features, such as dial access 
to trunks, make a PBX system more vulnerable to toll fraud?
The remainder of this chapter discusses general security measures you can take 
to protect your system. Chapters 3 through 6 discuss the specific actions that help 
prevent these features from being the target of unauthorized use.










