Author Topic: SX200 Embedded Voicemail Hacked  (Read 1378 times)

Offline Suavie

  • Contributer
  • *
  • Posts: 20
  • Country: us
  • Karma: +1/-0
    • View Profile
SX200 Embedded Voicemail Hacked
« on: August 06, 2019, 09:12:25 AM »
With hackers getting more and more aggressive. How are you locking down your systems to prevent this?


Offline johnp

  • Global Moderator
  • Hero Member
  • *****
  • Posts: 2202
  • Country: us
  • Karma: +66/-0
    • View Profile
Re: SX200 Embedded Voicemail Hacked
« Reply #1 on: August 06, 2019, 06:43:57 PM »
In a 200 environment, I would make sure the default passcodes are changed, you could also expand the passcode length

Offline acejavelin

  • Global Moderator
  • Hero Member
  • *****
  • Posts: 4100
  • Country: us
  • Karma: +133/-0
  • High-tech, heavy metal redneck!
    • View Profile
    • Like what I do and wanna help out? Send me a donation!
Re: SX200 Embedded Voicemail Hacked
« Reply #2 on: August 06, 2019, 07:24:24 PM »
In a 200 environment, I would make sure the default passcodes are changed, you could also expand the passcode length
Passcode length a minimum of 6 digits.
Change Installer, Manager, and Admin level passcodes.
Make Mailbox 0 a Message Only mailbox (may take some finesse in some instances).
Change the COR to for all VM ports so they cannot dial out, or cannot dial long distance. (This may cause an issue with "press 2 to be connected to my cell phone" but losing this feature is a small price to pay for the few LD cell phone users who use it)

Mitel used to have a document on recommended changes, but these are the main ones. Oh, and make sure your ARS is setup correctly, and blocking known area codes and international access except for the few users who really need it.


 

Sitemap 1 2 3 4 5 6 7 8 9 10