Welcome to WordPress. This is your first post. Edit or delete it, then start blogging!
Morning Ireland RTE Radio 1
Dr. Paul Conway Head of Compliance and Operations (ComReg) talks about the rapid increase of phone hacking in Ireland since 2011.
Hijacked Phone Lines amongst other items discussed on “You and Yours”
There’s been a sharp increase in the number of phone lines being hijacked by criminals. BBC Radio 4 reveal what they’re doing, how they’re doing it and why innocent bill-payers are being left to pick up the tab.
Premium rate phone scam?
Channel 4 News has learned that international fraudsters targeting UK businesses with a complex phone-hacking scam, stole £30,000 from one local authority in just two days.
SIPwall.Cloud solution
Have you secured your SIP Trunks from the continuous threat of Toll Fraud? Toll Fraud Security Alert – SIPwall.cloud – The new cloud based toll fraud protection service launching soon from Pbxwall Ltd.
TDMwall Protecting the Enterprise
TDMwall™ was designed and developed for a pure TDM environment where multiple ISDN trunks integrate to a PBX system.The entry level TDMwall™ is configured to protect a single PRA Circuit and can be easily expanded to protect multiple PRA circuits.
Can Your UC Infrastructure Withstand a Cyber Attack
Defending against today’s cyber threat landscape requires a proactive, real-time approach to managing risk. In this fast evolving environment, the challenge is for private and public sector organizations to manage risk in the purest sense – by making informed, predictive…
Keeping you secured
Along our journey to commercialize Pbxwall, we engaged with international resellers, heads of ICT and security, to further develop our services to protect critical infrastructure from other cyber threats such as TDoS (telephony denial of service), phishing and eavesdropping.
Protecting you
Pbxwall is a cyber security business that protects corporate telephony networks such as UC (unified communications), PBX and contact centre solutions from a significant range of cyber threats that are designed to extort revenue and/or deliberately disrupt critical infrastructure and…
Hello world!
Welcome to WordPress. This is your first post. Edit or delete it, then start blogging!