SME Cybersecurity and the PSTN switch-off: secure your phone lines before the deadline

SME Cybersecurity and the PSTN switch-off: secure your phone lines before the deadline
Image Credit: BT Group

Gibraltar:  Monday, 06 April 2026 – 07:00 CET

SME Cybersecurity and the PSTN switch-off: secure your phone lines before the deadline
By: Iain Fraser – Cybersecurity Journalist
Published in Collaboration with:
Securus Technology Group
SMECyberInsights.co.uk – First for SME Cybersecurity
Google Indexed on: 060426 at 08:05 CET
#SMECyberInsights #SMECybersecurity #SMECyberInsights #SME #CyberSafe #CyberSecurity #Cybersecurity #BT #PSTN



SME Cybersecurity and the PSTN switch-off: secure your phone lines before the deadline

Why the PSTN switch-off is a cyber risk, not just a telecoms job

If your phones still rely on the old copper network, the switch to digital is now a business risk with a cybersecurity edge. For UK SMEs, “voice” is not just dial tone; it is customer service, payment calls, appointment bookings, and often the route attackers use to impersonate staff, reset passwords, or redirect invoices.

This matters because the attack trend is already clear. The UK Government’s Cyber Security Breaches Survey 2025 reports 43% of UK businesses experienced a breach or attack in the last 12 months, with phishing still the most common (reported by 37%). Criminals blend email, calls, and SMS into one convincing story, and a rushed phone call is often the final nudge that makes a scam land.

What is the PSTN switch-off, and what changes for SMEs?

The Public Switched Telephone Network (PSTN) is the legacy copper-based phone system. The “switch-off” means analogue services (including many traditional phone lines and some alarm, lift, and payment lines) must migrate to digital alternatives such as VoIP, hosted voice, or SIP.

In practice, the security model changes. Your phone service becomes another internet-connected system with an admin portal, user accounts, passwords, call forwarding rules, and integrations. That is great for features, but it also creates new ways to fail: account takeover, fraudulent call routing, SIM swap style social engineering, and outages if your broadband or power drops. BT has set out how it is supporting business customers through the final phase of this transition, including migration activity and communications to remaining PSTN users.

Where SMEs get caught out: real-world consequences

For a typical UK SME with outsourced IT and a shared admin login, the common pitfalls look like this:

* Business email compromise meets voice: an attacker phones “Accounts” pretending to be your supplier, then follows up with an invoice email. One weak verification step and the bank details change.

* VoIP admin portal compromise: reused passwords let criminals add call forwarding to premium-rate numbers, or intercept verification calls.

* Resilience gaps: broadband router failure or a power cut takes phones down; customer calls then divert to mobiles where staff use personal devices and ad-hoc processes.

SME Cybersecurity and the PSTN switch-off: secure your phone lines before the deadline

What should small businesses do first? High-impact steps you can implement this week

Start with controls that reduce fraud and limit blast radius, without needing an enterprise budget:

1. Create a line and dependency inventory (60 minutes). List every PSTN-connected service: handsets, alarms, EPOS, entry systems, fax, lift lines, and auto-diallers. Note the owner, supplier, and renewal date. This stops “mystery lines” breaking on cutover day.

2. Lock down voice admin access. Turn on multi-factor authentication (MFA) for the voice portal and any Microsoft 365 or Google accounts used to manage it. Remove shared admin accounts; use named admins and least privilege.

3. Set call forwarding and international dial rules deliberately. Disable international and premium-rate dialling unless needed. Add alerts for changes to routing, admin users, and billing thresholds (most hosted voice platforms support this).

4. Add a simple fraud “call-back” rule for payments. For any change of bank details or urgent payment request, require a call-back using a trusted number from your CRM or supplier onboarding record, not the number in the email. This is cheap, fast, and highly effective against impersonation.

5. Plan for power and broadband failure. Digital voice may need power on-site. Put the router and any essential handsets on a small UPS, and set a fallback (mobile diversion, secondary broadband, or a pre-agreed manual process).

6. Treat voice logs as security data. Keep call detail records and admin audit logs. If a fraud attempt happens, these logs support investigation and insurer queries.

7. Align to recognised UK guidance. Use the NCSC Small Business Guide and Cyber Essentials controls as your baseline: secure configuration, access control, malware protection, patching, and firewalls. Map your voice platform into those same controls, not as a separate “telephony” island.

8. Remember UK GDPR security expectations. If calls involve personal data (appointments, payments, health details), ensure “appropriate technical and organisational measures” cover the new system, including access control, staff training, and incident handling.

Takeaways for SME cyber resilience

The PSTN switch-off is a forcing function. Done well, it improves capability and resilience. Done in a rush, it creates a new fraud and outage surface. Focus on identity security (MFA), tight admin control, payment verification, and basic resilience planning, and you will be ahead of most small firms.

Download or create a one-page “Digital Voice Cutover Checklist” and use it to run a 30-minute meeting with your IT supplier and finance lead, then assign owners and dates for the eight actions above.

SECURUS Communications Ltd

Securus is a managed communications Operator, providing next-generation network infrastructure and value added services to Managed Hosting providers and the ‘cloud generation’​ of enterprises. Securus priority is to offer communication services that represent excellent value for money and are backed by exceptional levels of support.

Contact Securus
Securus Communications Ltd
Station Road, Landmark house, Hook, England RG27 9HA, GB
T: Enquiries:  | Service Desk: 03451 283458
Securus on LinkedIn | Securus on “X” | https://securuscomms.com