In recent years, the company known as Zoho, based out of India, had excellent software. Their software allowed companies a low-priced office solution for monitoring connections, remote assistance, and control. They also had a special CRM software that claimed to do many things for their users. They offered a full Internet of things (IoT) and IT management suite. Founded in 1996, the company has some good reviews on their software itself, but they have some of the worst customer services in the world. According to Trustpilot, the Zoho Corporation has a D-. The BBB has also rated them one star.
We’re going to cover some dangerous things. Why? Because while the lower prices of using various CRM software apps may be appealing, businesses should be warned of the numerous problems they can incur if they use Zoho for their business.
Table of Contents
Are keyloggers Hacker’s Best Friends?
In Dec. of 2018, Zoho was taken off of the internet altogether by their domain registrar company. Why? Because of their security issues. Zoho was flagged for being used by keylogger distributors who used keyloggers to transmit stolen data back and forth using Zoho Assist. This left Zoho to be punished for allowing alleged phishing attacks.
This means that Zoho was a big part of the whole conversation hijacking problem that has been increasing over the years. Many of the companies and hijackers that have been found are often from India and the Middle East. This means that they’re supporting the very people in their area for their malicious attacks. Of course, Zoho was back online shortly afterward, as they found some of the accounts and suspended them. They are patting themselves on the back for taking action.
If you find that any of your computers are infected with the Hawkeye Trojan, eliminate it. Then change all of your information. This is one of the keyloggers that Zoho hackers used!
Just How Insecure is Zoho?
Another downside to Zoho is that while they promise to be a very secure way to connect to others remotely, there are numerous vulnerabilities. Anyone who knows what they’re doing can easily open a command prompt or PowerShell terminal on Windows and get very detailed information all the way down to the remote assistant’s IP address, both privately and locally. They can then quickly and secretively set their items to browse through your entire computer. They’ll then steal pertinent information that can cripple your business right from under your nose.
It’s Not All Bad – Is It?
Of course, many users and companies that have used this software suite for their IT Support or e-mail practices state that they can do a lot when monitoring and linking their crucial customer information. The Zoho platform is also noted to be customizable, so you can use what you need to achieve your goals.
On the contrary, though, many of the platform apps don’t work as intended. There are numerous issues and bugs in the software apps, let alone the insecurities mentioned above. You shouldn’t have this many problems when you have a managed service. Then there’s the customer service. Zoho has been known not to update its customers with new releases. These often include bug fixes, leaving the customers entirely liable. They also have been flagged as one of the worst in customer service due to their inability to return correspondence. What good is paying for internet security if you can’t have customer service?
Our Take: There are Better Solutions
Zoho is just bad for business, period. Don’t fall for the possibility of having lower-priced CRM software that doesn’t work. Most of which can leave your business vulnerable to attacks. Our mission is to help stop these said attacks that can harm you or your company. If you’re looking for a better solution that allows high-quality monitoring, CRM applications and keeps you completely safe, you’re better off using Untangle. You can even deploy your VOIP equipment behind your Untangle firewall. As always, you’ll get advanced security for every single connection in your building. It keeps you and your precious data safe from hackers and anyone else that tries to steal it.