3CX: Difference between revisions

notice of possible deletion
Removed unneccesary info about company founder, and rectified article notices
 
Line 1: Line 1:
{{DeletionRequest|article potentially written with AI, not standarded format for company articles, article is half company half founder (self-promotion), all sources are Reddit.}}
{{SloppyAI}}
{{StubNotice}}
3CX, Inc., is a software development company and developer of the 3CX Phone System.
3CX, Inc., is a software development company and developer of the 3CX Phone System.


The 3CX Phone System is a software private branch exchange based on the SIP (Session Initiation Protocol) standard to allow calls via the public switched telephone network (PSTN) or via Voice over Internet Protocol (VoIP) services.
The 3CX Phone System is a software private branch exchange based on the SIP (Session Initiation Protocol) standard to allow calls via the public switched telephone network (PSTN) or via Voice over Internet Protocol (VoIP) services.


==Nick Galea==
In 2023, during a major supply chain attack affecting the 3CX desktop application, company's public response included engaging cybersecurity firm Mandiant and advising customers to uninstall affected versions. His communication during the breach received mixed reactions from the broader IT and managed service provider (MSP) communities.<sup>[[3CX#user-content-fn-1|1]][[3CX#user-content-fn-2|2]]</sup>
'''Nick Galea''' is the founder and Chief Technology Officer (CTO) of 3CX, a software-based private branch exchange (PBX) provider headquartered in Cyprus. He is known for leading the development of 3CX Phone System, a VoIP PBX solution used globally by small and medium-sized businesses.
 
===Career===
Galea founded 3CX in 2005 and initially served as CEO. Under his leadership, the company grew from a Windows-only PBX provider to offering cross-platform support including Linux, Android, and iOS clients. The software became popular due to its web-based interface and support for SIP-standard devices.
 
In 2023, during a major supply chain attack affecting the 3CX desktop application, Galea oversaw the company's public response, including engaging cybersecurity firm Mandiant and advising customers to uninstall affected versions. His communication during the breach received mixed reactions from the broader IT and managed service provider (MSP) communities.<sup>[[3CX#user-content-fn-1|1]][[3CX#user-content-fn-2|2]]</sup>


==Controversies==
==Controversies==


====Customer and Partner Relations====
====Customer and Partner Relations====
Nick Galea has been the subject of criticism from some 3CX users and partners for alleged heavy-handed moderation practices and perceived unprofessional conduct in public forums. Multiple users on Reddit have reported being banned from the official 3CX community forums for raising technical concerns or criticizing company policies.<sup>[[3CX#user-content-fn-3|3]][[3CX#user-content-fn-4|4]]</sup>
The company's CTO, Nick Galea, has been the subject of criticism from some 3CX users and partners for alleged heavy-handed moderation practices and perceived unprofessional conduct in public forums. Multiple users on Reddit have reported being banned from the official 3CX community forums for raising technical concerns or criticizing company policies.<sup>[[3CX#user-content-fn-3|3]][[3CX#user-content-fn-4|4]]</sup>


A recurring theme in these reports includes:
A recurring theme in these reports includes:
Line 24: Line 19:


====Supply Chain Incident Response====
====Supply Chain Incident Response====
In March 2023, 3CX was the victim of a high-profile supply chain attack, with desktop clients distributed via trojanized updates. During the incident, Galea issued statements that were later scrutinized for tone. A now-deleted Reddit comment attributed to Galea dismissed concerns by saying the issue was “not an exploit, it’s a feature,” which some MSPs interpreted as flippant.<sup>[[3CX#user-content-fn-7|7]]</sup>
In March 2023, 3CX was the victim of a high-profile supply chain attack, with desktop clients distributed via trojanized updates. During the incident, 3CX's CTO issued statements that were later scrutinized for tone. A now-deleted Reddit comment attributed to the CTO dismissed concerns by saying the issue was “not an exploit, it’s a feature,” which some MSPs interpreted as flippant.<sup>[[3CX#user-content-fn-7|7]]</sup>


In addition, 3CX faced backlash for requiring users to pay to open support tickets during the breach, which led to further public criticism from system administrators and IT professionals.<sup>[[3CX#user-content-fn-1|1]]</sup>
In addition, 3CX faced backlash for requiring users to pay to open support tickets during the breach, which led to further public criticism from system administrators and IT professionals.<sup>[[3CX#user-content-fn-1|1]]</sup>