Vulnerability of your..Voicemail?

Yup, another target for hackers – voicemail. It falls pretty low on the totem pole of items to secure, and leaves many vulnerabilities for that reason. For example, a mobile phone will rarely ask you for a password when you call from your own phone – what happens if you lose it? Anyone who picks it up can dial in and listen to your messages. eSecurityPlanet’s Robert McGarvey recently wrote an interesting piece on the subject which offers tips for securing your voicemail. He called upon Miro’s Sam Alapati for expert advice on the subject. Here are some tips from the article:

  • Set up your VM so that you have to type in a password every time you access it. Disable “password bypass” settings on your phone.
  • Delete VMs when you listen to them, and don’t leave sensitive info in VM.
  • Check your VM settings and do this periodically. Are copies automatically forwarded to numbers you don’t recognize? The settings control how VM is handled but most users never check them.
  • Create the most complicated password your system allows and change it frequently.

Leave a Comment

Your email address will not be published. Required fields are marked *


Contact Us

If you have an urgent question regarding your software licensing or a software audit, please contact Miro right away.

(732)738–8511 x1208
Use the chat box on the right

About Us

Miro is a leading global provider of software asset management services, specializing in license management, audit advisory, negotiation tactics, support management, and cloud services. We help our clients maximize ROI on their software license investments, stay in compliance, and minimize the impact of audits. Miro's performance guarantee promises that our long-tenured, diverse, and passionate team of expert analysts provides insightful and actionable advice to help our clients achieve the best possible outcomes.