Database Vulnerabilities: Top 10 Rules IT Shops Break

  • By

    Ericka Chickowski

    | Posted 2010-07-07
  • Email
No Title
1. Default, Blank and Weak Username/PasswordsThe same organizations that wouldn't think of ever leaving their router log-ins at their factory settings very frequently allow hundreds of databases to stand with default username-password combos.
Databases often serve as repositories of the most vital company data, but are often one of the least protected systems in IT environments. Here's a look at the top database vulnerabilities that IT shops tend to ignore, according to experts over at Application Security, Inc's Team SHATTER.

Submit a Comment

Loading Comments...

Thanks for your registration, follow us on our social networks to keep up-to-date