12 Common Vulnerabilities Found During Penetration Testing
In this ebook, we aim to assist you in making a business case for penetration testing and educate you about the types of vulnerabilities that may unknowingly be present on your network. Furthermore, we provide guidance on how to prepare your team for the results your penetration tester may uncover.
The report is divided into two parts. Part 1 covers the most common administrative security vulnerabilities such as unpatched internal systems, legacy systems, use of default credentials, inappropriate privileges, phishing, weak password policy, unlocked workstations, and poor physical security.
In Part 2, we delve deeper into technical vulnerabilities such as null session SMB, turned off SMB signing and LLMNR poisoning/relaying, SQL injection, and cross-site scripting (XSS).
Free Security Consultation
Protect Against Phishing With Engagement and Training
Adam Gleeson, Cyber Security Vendor Alliance Manager, discusses the threat businesses face from phishing and offers advice on how engagement & training can help protect against this threat.
Video: Old Tricks vs New Victims
Join this panel discussion during which the leaders in the cyber security industry will talk about how to protect your data, systems and people, within your budget.