In many cases, passwords are the primary line of defense protecting user accounts from being hijacked in an ATO attack. With the right policies and parameters in place to ensure strong, unique passwords, this defense can be quite effective. According to a 2019 survey by Google, a staggering 65% of [...]
All modern software contains vulnerabilities; either software defects that require patches to remedy, or configuration issues that require administrative activity to resolve.
For this reason, organisations should have a vulnerability management process which enables them to know what vulnerabilities are present within their IT estate on a regular basis. Executive staff should ideally be as aware of the major vulnerabilities in their IT estate as they are of their financial status.