Changes

Jump to navigation Jump to search
Line 28: Line 28:  
*Unsecured Networks - connecting to networks that are unsecured such as cafe, hotel and other open public networks are easy targets for exploitation.  
 
*Unsecured Networks - connecting to networks that are unsecured such as cafe, hotel and other open public networks are easy targets for exploitation.  
 
*Providing Internal Access Externally - servers will be exposed to the internet therefore increasing the potential risk and vulnerability of being compromised.
 
*Providing Internal Access Externally - servers will be exposed to the internet therefore increasing the potential risk and vulnerability of being compromised.
*Out of Date Software - When using personal devices system updates and patches cannot be guaranteed.
+
*Out of Date Software - When using personal devices system updates and patches cannot be guaranteed. These software vulnerabilities can give attackers a window of of opportunity to compromise information and employee data.  
 
*Conference Hijacking - An unauthorized person joins a conference because it is public or by obtaining the link.
 
*Conference Hijacking - An unauthorized person joins a conference because it is public or by obtaining the link.
 
*Targeted by APT actors - Advanced persistent threat (APT) actors can target open communications to exploit employee data and enterprise information.
 
*Targeted by APT actors - Advanced persistent threat (APT) actors can target open communications to exploit employee data and enterprise information.

Navigation menu

GCwiki