{"id":851,"date":"2019-09-23T20:10:30","date_gmt":"2019-09-23T19:10:30","guid":{"rendered":"http:\/\/hjinterim.org\/?p=851"},"modified":"2019-09-23T20:10:30","modified_gmt":"2019-09-23T19:10:30","slug":"the-big-list-of-information-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2019\/09\/23\/the-big-list-of-information-security-vulnerabilities\/","title":{"rendered":"The Big List of Information Security Vulnerabilities"},"content":{"rendered":"<p>Information security vulnerabilities are weaknesses that expose an organization to risk. Understanding your vulnerabilities is the first step to managing risk.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-853\" src=\"https:\/\/hjinterim.files.wordpress.com\/2019\/09\/picture1.png\" alt=\"Picture1\" width=\"939\" height=\"395\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2019\/09\/picture1.png 939w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2019\/09\/picture1-300x126.png 300w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2019\/09\/picture1-768x323.png 768w\" sizes=\"(max-width: 939px) 100vw, 939px\" \/><br \/>\nEmployees<br \/>\n1. Social interaction<br \/>\n2. Customer interaction<br \/>\n3. Discussing work in public locations<br \/>\n4. Taking data out of the office (paper, mobile phones, laptops)<br \/>\n5. Emailing documents and data<br \/>\n6. Mailing and faxing documents<br \/>\n7. Installing unauthorized software and apps<br \/>\n8. Removing or disabling security tools<br \/>\n9. Letting unauthorized persons into the office (tailgating)<br \/>\n10. Opening spam emails<br \/>\n11. Connecting personal devices to company networks<br \/>\n12. Writing down passwords and sensitive data<br \/>\n13. Losing security devices such as id cards<br \/>\n14. Lack of information security awareness<br \/>\n15. Keying data<\/p>\n<p>Former Employees<br \/>\n1. Former employees working for competitors<br \/>\n2. Former employees retaining company data<br \/>\n3. Former employees discussing company matters<\/p>\n<p>Technology<br \/>\n1. Social networking<br \/>\n2. File sharing<br \/>\n3. Rapid technological changes<br \/>\n4. Legacy systems<br \/>\n5. Storing data on mobile devices such as mobile phones<br \/>\n6. Internet browsers<\/p>\n<p>Hardware<br \/>\n1. Susceptibility to dust, heat and humidity<br \/>\n2. Hardware design flaws<br \/>\n3. Out of date hardware<br \/>\n4. Misconfiguration of hardware<\/p>\n<p>Software<br \/>\n1. Insufficient testing<br \/>\n2. Lack of audit trail<br \/>\n3. Software bugs and design faults<br \/>\n4. Unchecked user input<br \/>\n5. Software that fails to consider human factors<br \/>\n6. Software complexity (bloatware)<br \/>\n7. Software as a service (relinquishing control of data)<br \/>\n8. Software vendors that go out of business or change ownership<\/p>\n<p>Network<br \/>\n1. Unprotected network communications<br \/>\n2. Open physical connections, IPs and ports<br \/>\n3. Insecure network architecture<br \/>\n4. Unused user ids<br \/>\n5. Excessive privileges<br \/>\n6. Unnecessary jobs and scripts executing<br \/>\n7. Wifi networks<\/p>\n<p>IT Management<br \/>\n1. Insufficient IT capacity<br \/>\n2. Missed security patches<br \/>\n3. Insufficient incident and problem management<br \/>\n4. Configuration errors and missed security notices<br \/>\n5. System operation errors<br \/>\n6. Lack of regular audits<br \/>\n7. Improper waste disposal<br \/>\n8. Insufficient change management<br \/>\n9. Business process flaws<br \/>\n10. Inadequate business rules<br \/>\n11. Inadequate business controls<br \/>\n12. Processes that fail to consider human factors<br \/>\n13. Overconfidence in security audits<br \/>\n14. Lack of risk analysis<br \/>\n15. Rapid business change<br \/>\n16. Inadequate continuity planning<br \/>\n17. Lax recruiting processes<\/p>\n<p>Partners and Suppliers<br \/>\n1. Disruption of telecom services<br \/>\n2. Disruption of utility services such as electric, gas, water<br \/>\n3. Hardware failure<br \/>\n4. Software failure<br \/>\n5. Lost mail and courier packages<br \/>\n6. Supply disruptions<br \/>\n7. Sharing confidential data with partners and suppliers<\/p>\n<p>Customers<br \/>\n1. Customers access to secure areas<br \/>\n2. Customer access to data (ie. customer portal)<\/p>\n<p>Offices and Data Centers<br \/>\n1. Sites that are prone to natural disasters such as earthquakes<br \/>\n2. Locations that are politically unstable<br \/>\n3. Locations subject to government spying<br \/>\n4. Unreliable power sources<br \/>\n5. High crime areas<br \/>\n6. Multiple sites in the same geographical location<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security vulnerabilities are weaknesses that expose an organization to risk. Understanding your vulnerabilities is the first step to managing risk. Employees 1. Social interaction 2. Customer interaction 3. Discussing work in public locations 4. Taking data out of the office (paper, mobile phones, laptops) 5. Emailing documents and data 6. Mailing and faxing documents &#8230; <a title=\"The Big List of Information Security Vulnerabilities\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2019\/09\/23\/the-big-list-of-information-security-vulnerabilities\/\">Read more<span class=\"screen-reader-text\">The Big List of Information Security Vulnerabilities<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":858,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[25],"tags":[],"class_list":["post-851","post","type-post","status-publish","format-quote","has-post-thumbnail","hentry","category-security","post_format-post-format-quote"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=851"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/851\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/858"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}