dcsimg
 

Database Vulnerabilities: Top 10 Rules IT Shops Break

  • By

    Ericka Chickowski

 
 
 
Previous
No Title
Next
1. Default, Blank and Weak Username/PasswordsThe same organizations that wouldn't think of ever leaving their router log-ins at their factory settings very frequently allow hundreds of databases to stand with default username-password combos.
Databases often serve as repositories of the most vital company data, but are often one of the least protected systems in IT environments. Here's a look at the top database vulnerabilities that IT shops tend to ignore, according to experts over at Application Security, Inc's Team SHATTER.
This article was originally published on 2010-07-07