*Lack of physical security - devices can be stolen, drives can be copied, or people can shoulder surf.
*Lack of physical security - devices can be stolen, drives can be copied, or people can shoulder surf.
−
*Unsecured Networks - connecting on networks that are unsecured such as cafe, hotel and other open public networks are easy targets for exploitation.
+
*Unsecured Networks - connecting to networks that are unsecured such as cafe, hotel and other open public networks are easy targets for exploitation.
−
*Providing Internal Access Externally - servers will be facing the internet therefore increasing the potential risk and vulnerability of being compromised.
+
*Providing Internal Access Externally - servers will be exposed to the internet therefore increasing the potential risk and vulnerability of being compromised.
*Out of Date Software - When using personal devices system updates and patches cannot be guaranteed.
*Out of Date Software - When using personal devices system updates and patches cannot be guaranteed.
*Conference Hijacking - An unauthorized person joins a conference because it is public or by obtaining the link.
*Conference Hijacking - An unauthorized person joins a conference because it is public or by obtaining the link.