*Lack of physical security - devices can be stolen, drives can be copied, or people can shoulder surf.
*Lack of physical security - devices can be stolen, drives can be copied, or people can shoulder surf.
−
*Unsecured Networks - connecting on networks that are unsecured such as cafe, hotel and other open public networks are easy targets for exploitation.
+
*Unsecured Networks - connecting to networks that are unsecured such as a cafe, hotel or other open public networks are easy targets for exploitation.
*Providing Internal Access Externally - servers will be facing the internet therefore increasing the potential risk and vulnerability of being compromised.
*Providing Internal Access Externally - servers will be facing the internet therefore increasing the potential risk and vulnerability of being compromised.
*Teleconference Hijacking/Zoom - Unauthorized persons gaining access to a conference by joining a public conference, being shared the link or access code.
*Teleconference Hijacking/Zoom - Unauthorized persons gaining access to a conference by joining a public conference, being shared the link or access code.