Get a Pentest and security assessment of your IT network.

Cyber Security

Common Security Misconfigurations and Their Consequences

Security misconfigurations can create exploitable issues that can haunt us later. These include development permissions that don’t get changed when something goes live. Laptops that rarely ever connect directly to a company network may go for months without getting updates. VPN systems allow remote workers to access company data safely, but a large number of VPN clients default to an insecure configuration out-of-the-box. Split-tunnel VPN configurations route user traffic over the secure network only when protected systems are being accessed but send all other traffic directly to the Internet.

Source: https://thehackernews.com/2020/12/common-security-misconfigurations-and.html

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security