I would run a monitor trace and see if someone else is indeed logging into that extension. If the phone system is reachable from the outside world (on a public IP or ports forwarded incorrectly from firewall, etc) someone could be hitting the system that you are unaware of.
The truth is just an excuse for lack of imagination.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.