1. Default, Blank and Weak Username/PasswordsThe same organizations that wouldn't think of ever leaving their router log-ins at their factory settings very frequently allow hundreds of databases to stand with default username-password combos.
Databases often serve as repositories of the most vital company data, but are often one of the least protected systems in IT environments. Here's a look at the top database vulnerabilities that IT shops tend to ignore, according to experts over at Application Security, Inc's Team SHATTER.
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.