Have hackers got your (fax) number?

The right time to move fax to the cloud is now

Earlier this year, Check Point Software managed to hack an HP all-in-one printer. The company exploited a weakness the OS of two HP models had when handling fax. It caused quite a fuss for us in the fax business. Bad news travels fast, they say. False news, it turns out, travels faster. Check Point’s conclusion that the fax protocol is at risk or at fault is just not true, but anything that focuses on the security of your communications can’t be all bad.

Calling it ‘breaking the unbreakable’ and giving their hacking operation a catchy code name of ‘Faxploit’, they did indeed hack an HP device and manage to gain access to the corporate network. However, what they demonstrated was a weakness in the device, not any inherent vulnerability in fax, fax machines or, most importantly, the fax protocol. You can read more about that one of my previous blog posts.

While this exercise didn’t expose any security weakness of fax itself, it was a perfectly good illustration of the vulnerabilities that can happen in any network device and the hacker’s ingenuity and tenacity to find those vulnerabilities.

Transitioning to cloud fax: The secure and easy option

As fax is central to so many enterprise business processes, it may be time to transition to a cloud-based fax infrastructure that’s right for your business, without sacrificing security and compliance requirements.

As the leader and most trusted cloud fax provider, OpenText designed its service and multiple data centers with a number of security features to protect and defend your data at all times—whether in transit or at rest. This includes:

  • Encryption – Content is encrypted at rest and in transit.
  • Network segmentation – Separate network segments are used for the live, development, and Quality Assurance environments in DMZ network segments (separated from the network by firewalls).
  • Firewalls – Firewall rules block all paths from the fax to the network that are not explicitly required to send and receive the fax. A multi-tiered firewall architecture provides defense-in-depth covering the storage, connection and transmission of information.
  • Intrusion detection/prevention systems – IDS/IPS devices are used at the firewall to monitor and prevent unauthorized activity and to inform you immediately of any suspicious activity.
  • Network vulnerability scans – Scans are Performed regularly by the OpenText global information security team using the latest scanning techniques and technologies.
  • Anti-virusThe latest anti-virus solutions are deployed, and automated updates occur regularly to ensure that protection is always up to date.

Plus more built-in security to protect and defend data at all times.

Deploying a cloud infrastructure allows you to benefit from the speed, convenience and security of a cloud fax deployment. It allows you to transition away from your on-premises fax hardware, software and telephony in a way that meets your business and budget requirements.

In addition, it enables you to experience all the features of full enterprise cloud fax services. Not all cloud fax is the same. For most companies, enterprise application integration, reliability, scalability, and security are key requirements for their fax capabilities and only enterprise cloud fax—such as OpenText™ Fax2Mail™—provides this level of functionality.

Is it time to move to the cloud for your fax requirements? We think so. Watch this demo of Fax2Mail to see how easy it is for users and administrators alike.

Amy Perry

Amy Perry is the Director of Product Marketing for fax and secure messaging solutions with OpenText Business Network. Her 20 year career has crossed between Product Management and Product Marketing in the CPG and software industries.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Close