Database Vulnerabilities: Top 10 Rules IT Shops Break

  • By

    Ericka Chickowski

    | Posted 2010-07-07
  • Email
 
 
 
Previous
No Title
Next
1. Default, Blank and Weak Username/PasswordsThe same organizations that wouldn't think of ever leaving their router log-ins at their factory settings very frequently allow hundreds of databases to stand with default username-password combos.
Databases often serve as repositories of the most vital company data, but are often one of the least protected systems in IT environments. Here's a look at the top database vulnerabilities that IT shops tend to ignore, according to experts over at Application Security, Inc's Team SHATTER.
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date