Top Five Factors Leading to Telco Blowouts


1. Misunderstanding how mobile cap plans work.
Given that mobile cap plans are the most common type used by Australian mobile phone users, I remain consistently surprised by how little the general user understands about how they work. At their best, caps are great value. At their worst, they are an elaborate trap laid by the telcos to ensnare the unwary. The key to effectively mastering cap plans is to be realistic about your needs, to understand the risks, and choose the cap plan that is appropriate for you. You can find a comprehensive explanation of how cap plans work here.

2. Not being aware of what you are currently paying for
- unconsolidated bills
- often smaller accounts are not included on best negotiated rates.
- extra unused lines
- can request a line audit form your incumbent carrier
- most organisations have at least one unused / unneeded PSTN lines. Many companies have dozens.
- Service and Equipment extras
- We discover all kinds of bizarre stuff in this category, including lots of legacy equipment and services that are no longer in use - old handsets still incurring monthly fees
- unused mobiles

- In the vast majority of cases, these are a pure money drain.

3. Mobile Data

- what uses data: Email, websearches, iMessage, Skype / Viber, many many apps such as facebook and twitter etc.

4. PABX Hacking

PABX security should be taken very seriously, since hacking costs businesses a great deal of time and money,

and inevitably leads to strained relations with the carrier. This is an issue that is much more widespread than is commonly reported to police, since most organisations are not willing to reveal a major security breach. Official figures are therefore difficult to obtain, although the Australian Federal Police estimate PABX hacking costs Australian businesses tens of millions of dollars each year.

Dog and Bone has previously published a list of ten precautions your organisation can take to stop would-be hackers. In the vast majority of cases, taking precautions such as these would have stopped any security breach from occurring.


5. Global Roaming
- Extravagantly high costs
- Airtime fees
- Mobile data