EOS IT

3CX Phone System Security Event

EOS IT are monitoring and reviewing our 3CX telephony product offering in response to the recently announced security compromise of the 3CX soft phone software.

We’d like to reassure all our clients, the 3CX solution recommended, installed and managed by EOS IT has NOT been identified as compromised at time of writing. The 3CX soft phone application versions approved and installed by EOS IT are not known to be vulnerable to this compromise based on all of the research performed by 3CX and other security organisations.

EOS IT provide a range of security service offerings for our clients that can provide additional securities to protect against these type of evolving security events, the most effective of these in this particular instance is our SentinelOne EDR (Endpoint Detection and Response) tool that disables and quarantines any suspicious applications or subcomponents, providing enhanced protection for our clients, their network, their individual assets and their reputation.

SentinelOne is one of the products available under our enhanced security protection product offering called the Managed Service Gold Security Pack. This particular security pack, and the SentinelOne EDR application in particular can accurately detect this specific 3CX compromise ensuring that infected software or suspicious activity relating to the software is detected, quarantined and prevented from spreading.

EOS IT provides industry-leading solutions to all our clients, like the 3CX telephony solution which is used by approximately 600,000 companies worldwide and provides telephone services for organizations in all business sectors. The compromise is quite sophisticated and advanced in its design and attack method and is being actively addressed by 3CX themselves as a priority.

We will continue to monitor and assess the security compromise as it evolves and will keep you fully informed should any other risks or compromises identified in any of the deployed EOS IT solutions. If you would like any further information on this, please feel free to reach out to us on 1300 597 277.

Recent Posts

How to be Cyber Secure in the Aged Care Sector
The aged care sector is an invaluable service for the population, which also makes it one of the most at risk sectors for a cyber ...
Navigating the Risks of Rapid Tech Acceleration
We’re living in a time when the possibilities seem endless. From self-driving cars to AI-powered surgeries, tech innovations are rapidly becoming integral to our lives.
The Importance of Data Security in the Legal Industry
In the legal industry, safeguarding sensitive information isn't just a good business practice—it's a core responsibility.
Why Do Your Employees Need Cyber Security Training?
In today’s rapidly evolving cyber security landscape, organisations across the world are becoming increasingly aware of the persistent dangers posed by cyber criminals.
Assess Cyber Security Risks in 7 Steps
We’re living in a time when the possibilities seem endless. From self-driving cars to AI-powered surgeries, tech innovations are rapidly becoming integral to our lives.
How to Build a Security-First Culture That Empowers Your Workforce
Imagine a workplace where every employee is vigilant against cyber threats, a place where security isn’t just a protocol but a mindset. Achieving this vision ...