Earlier this year, Check Point Software managed to hack an HP all-in-one printer. The company exploited a weakness the OS of two HP models had when handling fax. It caused quite a fuss for us in the fax business. Bad news travels fast, they say. False news, it turns out, travels faster. Check Point’s conclusion that the fax protocol is at risk or at fault is just not true, but anything that focuses on the security of your communications can’t be all bad.
Calling it ‘breaking the unbreakable’ and giving their hacking operation a catchy code name of ‘Faxploit’, they did indeed hack an HP device and manage to gain access to the corporate network. However, what they demonstrated was a weakness in the device, not any inherent vulnerability in fax, fax machines or, most importantly, the fax protocol. You can read more about that one of my previous blog posts.
While this exercise didn’t expose any security weakness of fax itself, it was a perfectly good illustration of the vulnerabilities that can happen in any network device and the hacker’s ingenuity and tenacity to find those vulnerabilities.
Transitioning to cloud fax: The secure and easy option
As fax is central to so many enterprise business processes, it may be time to transition to a cloud-based fax infrastructure that’s right for your business, without sacrificing security and compliance requirements.
As the leader and most trusted cloud fax provider, OpenText™ designed its service and multiple data centers with a number of security features to protect and defend your data at all times—whether in transit or at rest. This includes:
- Encryption – Content is encrypted at rest and in transit.
- Network segmentation – Separate network segments are used for the live, development, and Quality Assurance environments in DMZ network segments (separated from the network by firewalls).
- Firewalls – Firewall rules block all paths from the fax to the network that are not explicitly required to send and receive the fax. A multi-tiered firewall architecture provides defense-in-depth covering the storage, connection and transmission of information.
- Intrusion detection/prevention systems – IDS/IPS devices are used at the firewall to monitor and prevent unauthorized activity and to inform you immediately of any suspicious activity.
- Network vulnerability scans – Scans are Performed regularly by the OpenText global information security team using the latest scanning techniques and technologies.
- Anti-virus – The latest anti-virus solutions are deployed, and automated updates occur regularly to ensure that protection is always up to date.
Plus more built-in security to protect and defend data at all times.
Deploying a cloud infrastructure allows you to benefit from the speed, convenience and security of a cloud fax deployment. It allows you to transition away from your on-premises fax hardware, software and telephony in a way that meets your business and budget requirements.
In addition, it enables you to experience all the features of full enterprise cloud fax services. Not all cloud fax is the same. For most companies, enterprise application integration, reliability, scalability, and security are key requirements for their fax capabilities and only enterprise cloud fax—such as OpenText™ Fax2Mail™—provides this level of functionality.
Is it time to move to the cloud for your fax requirements? We think so. Watch this demo of Fax2Mail to see how easy it is for users and administrators alike.