Depending on the skill of the person doing the changing and the degree of the operation they would be pulling off of course it would be possible. Sometimes things don't need to be hacked to get changed nor does it necessarily need to be malicious in nature. For example, an IT guy could get a work order to change a config or run some commands or upgrade the firmware, heck even swap a device out.
You can have threat scenarios from in person infiltration all the way up to remote execution, it all depends on the amount of resources you want to throw at one network closet in Arizona.
That's why its good to have good backups, monitoring and logging (and understand how to read them) of all network infrastructure regardless if its a small home business or a large government agency.
Depending on the skill of the person doing the changing and the degree of the operation they would be pulling off of course it would be possible. Sometimes things don't need to be hacked to get changed nor does it necessarily need to be malicious in nature. For example, an IT guy could get a work order to change a config or run some commands or upgrade the firmware, heck even swap a device out.
You can have threat scenarios from in person infiltration all the way up to remote execution, it all depends on the amount of resources you want to throw at one network closet in Arizona.
That's why its good to have good backups, monitoring and logging (and understand how to read them) of all network infrastructure regardless if its a small home business or a large government agency.