• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

How to Avoid the Top Three Causes of Data Breaches in 2019

October 24, 2019 by Numneung Koedkietpong Leave a Comment

The article states that there are three main causes of data breaches in 2019 as following;

  1. Misconfigured cloud storage: most of companies don’t use encryption to protect data in cloud or don’t put any security access control as a standard. What’s more, they don’t concern about term and agreement.
  2. Unprotected code repositories: external software developers are the weakness because they lack of security traning awareness which allows attackers easily exploit to the systems.
  3. Vulnerable open source software: The companies still have the vulnerabilities of open source component, libraries, and frameworks. Patches are not regularly updated.

Therefore, five recommendations are provided;

  1. Maintain an up2date and holistic inventory of your digital assets
  2. Monitor your external attack surface and risk exposure
  3. Keep your software up2date, implement patch management and automated patching
  4. Prioritize your testing and remediation efforts based on risks and threats
  5. Keep an eye on Dark Web and monitor data leaks.

Source: https://thehackernews.com/2019/10/data-breach-protection.html

Filed Under: Uncategorized Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in