BillSimon - well said. We need to be smart, but not over react. We have removed all Sangoma SSH keys and we have removed Sangoma whitelist entries on our firewalls. Apart from that, the only other vector would be a “Solarwinds Orion” type of hack, where a threat actor has infiltrated module updates that gives the threat actor access to our PBXes - but I think that is far less likely, especially based upon the files that have been released, which all look like financial docs.
This really drives the question of security in general at Sangoma and specifically in business operations. Firewall setup, email security, least privilege, zero trust, workstation lockdowns, SIEM - it seems it must not have existed. I hope the tech folks at Sangoma have taken more precaution than the business operations people.