Database Vulnerabilities: Top 10 Rules IT Shops Break

  • By

    Ericka Chickowski

    | Posted 2010-07-07
No Title
1. Default, Blank and Weak Username/PasswordsThe same organizations that wouldn't think of ever leaving their router log-ins at their factory settings very frequently allow hundreds of databases to stand with default username-password combos.
Databases often serve as repositories of the most vital company data, but are often one of the least protected systems in IT environments. Here's a look at the top database vulnerabilities that IT shops tend to ignore, according to experts over at Application Security, Inc's Team SHATTER.

Submit a Comment

Loading Comments...

By submitting your information, you agree that channelinsider.com may send you channelinsider offers via email, phone and text message, as well as email offers about other products and services that channelinsider believes may be of interest to you. channelinsider will process your information in accordance with the Quinstreet Privacy Policy.

Thanks for your registration, follow us on our social networks to keep up-to-date