Attackers could access and modify agent resources, telephone queues and other customer-service systems – and access personal information on companies’ customers.

By admin