Is Dial-In Conference Calling A Vulnerable Method?

In January 2012, the FBI hosted an audio conference call with the UK police to discuss their strategy to take on hackers. The agencies shared dates of planned arrests along with the details of the evidence against the groups including The Anonymous. After a few days, the entire call recording was uploaded to a website by a member of The Anonymous, leaving law enforcement agencies red-faced.

It turns out, The Anonymous hacked into an email of one of the FBI officers who was a call participant and accessed the bridge number and the officer’s passcode to join the conference call. Neither the FBI nor the UK Cops realized that the hackers were listening in on their ‘confidential’ conversation the entire time.

To be fair to the agencies, they can’t be the only ones to blame for this horrendous breach. And, that’s because the fault also lies with the method of conference calling they chose – dial-in.

[Read Link: An Oversimplified Guide To Dial-Out & Dial-In Conference Calling]

How Dial-In conference calling puts critical data at risk?

With dial-in conferencing, the host usually shares with the participants an email or an SMS invite detailing the bridge number and a unique PIN used to dial-in to the teleconference. So, anyone with the bridge number and unique passcode can join the conference call at any time. The lack of member visibility where the host has to get verbal assurances about the participants’ identity, and the host’s limited ability to control the call, also make this conferencing method susceptible to security breaches.

A study concluded that about 70% of the participants share confidential information on concalls, often making dial-in an easy target for eavesdroppers. Moreover, with over 50% participants saying that it’s normal to not know all the participants of a conference call is a recipe for disaster.

During the 2012 call, the security agencies remained unaware of these challenges as they chose to share such critical information on a dial-in conference call. Instead, they

could’ve opted for a dial-out solution such as grptalk, which offers absolute security, as there are no email invites, bridge numbers or PINs to be shared.

[Read Link: Do You Really Need a Bridge Number to Conference Call?]

Why is Dial-Out a more secure option?

In the dial-out conference calling setup, the host will initiate the call with a select group of people at the same time from a single phone. The conference call begins as soon as the first participant answers their phone. There is no need to share bridge numbers or passcodes with participants. Only the members that have been selected by the host will receive the call, which eliminates the probability of anyone attempting to eavesdrop or listen in on the call.

Why grptalk is the best Dial-Out solution?

grptalk equips hosts with many features including advanced analytics, web interface, and call recording downloads to put them in charge of the conference. With Add and Remove options, the host can add a participant to the call or hang up on anyone during the teleconference.

Don’t you think it’s time organizations switch to a more secure conferencing option, instead of continuing with antiquated and extremely vulnerable dial-in methods? If you want to secure your conference calls, please drop us an email at hello@grptalk.com. You can contact Vasu on +91-703-220-6149 to get the best conference calling plan.

Leave a Reply

Your email address will not be published. Required fields are marked *