Need The Best IT Services?

Call Us Today!

(719) 355-2440

Navigating the 3CX Desktop App Supply Chain Attack: Insights and Recommendations from Colorado Computer Support

The recent supply chain attack on the 3CX Desktop App has generated a whirlwind of concerns and discussions in the IT world. The risk of compromised systems is significant because the app is widely used across various application spectrums. As a leader in providing expert IT support and guidance, Colorado Computer Support is here to help you navigate the complexities of this cybersecurity incident.

This blog post will discuss expert opinions, recommendations, and the importance of robust cybersecurity measures in the face of such threats.

The recent supply chain attack on the 3CX Desktop App has raised concerns in IT due to its widespread use across various applications. Industry experts, including Colorado Computer Support’s CEO, Blake Schwank, have discussed the incident and shared insights on the importance of robust cybersecurity measures. Recommendations include updating software regularly, monitoring systems for signs of compromise, implementing strong security measures, considering alternative communication software, and staying informed about cybersecurity threats.

Colorado Computer Support emphasizes the need for vigilance and collaboration in the face of emerging threats, offering expert guidance and support to help clients navigate the ever-evolving cybersecurity landscape.

YouTube video

Hear From Our
Happy Clients

Read Our Reviews
Read Reviews about Colorado Computer Support

The 3CX Desktop App Compromise

Hackers recently compromised the 3CX Desktop App in a supply chain attack, potentially exposing countless systems to risks. Several industry experts have weighed in on the situation, including our CEO, Blake Schwank, who released a video discussing the attack and raising awareness about the incident.

Luis Alvarez, CEO of the Alvarez Technology Group, pointed out that the attack affected a broad range of applications due to the widespread use of 3CX. The Cybersecurity and Infrastructure Security Agency (CISA) issued an alert in response to the attack, and 3CX has taken steps to mitigate the exploit.

Expert Recommendations and Experiences

Robert Giannini with Giaspace in the Lakeland, FL area shared his experience with Threatlocker and other companies swiftly responding to the matter. Giannini revealed that they have been phasing out 3CX in favor of Broadvoice and criticized 3CX’s initial response on their forum, where they denied the issue and directed users to work with vendors on false positives.

Nick Martin, Director of Managed Services with Mainstreet IT Solutions, commended CrowdStrike for actively blocking the attack, showcasing the importance of robust cybersecurity measures in protecting users’ systems.

Colorado Computer Support’s Stance

At Colorado Computer Support, we understand the gravity of supply chain attacks and the potential damage they can cause to businesses and individual users. As such, we want to emphasize the importance of implementing strong cybersecurity measures and remaining vigilant in the face of emerging threats.

We recommend that businesses and users:

  1. Update their software regularly and ensure they have the latest security patches installed.
  2. Monitor their systems for signs of compromise and take immediate action if suspicious activity is detected.
  3. Implement robust security measures like firewalls, intrusion detection systems, and endpoint protection software.
  4. Consider alternative communication software options if they currently use 3CX in light of the recent attack.
  5. Stay informed about cybersecurity threats and best practices by following trusted sources and industry experts.


The 3CX Desktop App compromise is a stark reminder of the need for strong cybersecurity measures and collaboration among industry professionals. As experts continue to address the issue and share their insights, it is crucial that the IT world remains vigilant and works together to safeguard against supply chain attacks.

At Colorado Computer Support, we are committed to providing our clients with expert guidance and support in navigating the ever-evolving landscape of cybersecurity threats. If you have any questions or concerns regarding the 3CX Desktop App attack or any other cybersecurity matter, please don’t hesitate to contact us. Our team of skilled professionals is here to help you protect your business and your data.

Searching For A Reliable Technology Service and IT Management Team?

Connect With CCS To Schedule An Initial Consultation
You consent to receive text communication from Colorado Computer Support by entering your phone number. Rates and terms may apply—text STOP to opt-out.

Latest Blog Posts

How To Permanently Delete Your Data
How To Permanently Delete Your Data

Working with attorneys recently, I found out about the importance of [...]

Read More
How To Create QR Codes With Ease
How To Create QR Codes With Ease

Learn how to create QR codes effortlessly with our step-by-step guide. [...]

Read More
Maybe QR Codes Are Not That Safe After All
Maybe QR Codes Are Not That Safe After All

Discover the hidden risks of QR codes in our latest article, "Maybe QR [...]

Read More
Read The CCS Tech Blog

Certified and Verified Service-Disabled Veteran-Owned Small Business (SDVOSB)

Colorado Computer Support is a local IT company certified and verified service-disabled veteran-owned Small Business. When you use our IT services, you can be confident that you are dealing with a company owned by a disabled veteran and that they will be able to provide you with the best possible IT support.