First page Back Continue Last page Summary Graphics
Telecommunications findings
Typical:
- Fix the technical vulnerabilities
- Disconnect the unauthorized connections
- Figure out who is making them and why
- Discuss wares with (ir)responsible employee
- Fix weak passwords
- Address exploitable configurations
- Investigate voicemail abuse
Notes: