12 security vulnerabilities hackers target and abuse

Any network or device worth securing is worth hacking into as well. So, how do hackers target these vulnerable areas?
Here are 10 obvious weak areas that attract hackers.
- Gullible and over-trusting users
- Unsecured building and computer room entrances
- Discarded documents and computer disks
- Network perimeters with little to no firewall protection
- Poor access controls
- Un-patched systems
- Web applications with weak authentication systems
- Open wireless networks
- Passwords that are easy to decipher
- No set processes for monitoring, scanning, logging or file integrity monitoring
Call Omega if you have any questions about the security of your network environment. We have a 30-minute free assessment offer that you can utilize. Phone 636-557-7777 or email pci@www.omegasecure.com.
Some points have been borrowed from an article written by the principal at the NY criminal defense law firm Bukh and Associates, PLLC.