Google simplelize | world's ultimate online tech magazine

Tech top-5-mistakes

Published on April 7th, 2013 | by John I.


Ways People Leave themselves Open to Compromise from Hackers

Assuming that patching is good enough. Applications and operating systems should be upgraded regularly to deter attacks. It’s important for applications to be properly configured as this helps minimize vulnerabilities on the system.

Also, failure to enforce configuration puts your system at a risk of being hacked. These include such things as having poor admin policies and failure to detect abnormal behavior. When you have poor access control, you tend to put yourself at the mercy of hackers.

Non enforcement of best practices is also a reason why hackers would penetrate a system quickly.Moreover, when obvious computer names are used; it makes it easy for hackers to identify critical names that would aid them in their hacking.

Poor enforcement of password policies could make it easy for hackers to penetrate your systems. Others are using default passwords on equipment as provided by the manufacturers. Failure to educate users about insecure behavior, risks, social media and online risks is a recipe for hackers to penetrate your systems.

Storing sensitive information or data on shared servers, failure to detect outgoing sensitive data and allowing data access without exercising adequate control.

The infographic below is a representation of the above

Top Five Mistakes - Infographic

Click here to join Symantec’s Cyber Readiness Challenge.

Tags: , ,

About the Author

Is an IT professional who loves writing about the latest technology news.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Back to Top ↑