When this flaw exists , obsolete routers, switches, or servers aren’t able to use the most recent security updates.
Obsolete & Unpatched Network Resources
These threats can disable machines or entire computer systems by overloading them with traffic.
Denial of service (DoS) and distributed denial of service (DDoS) attacks
Blank is the cause of 85% of of all data breaches
employees/humans
This internet communication protocol that isn’t inherently secure.
HTTP
Hypertext Transfer Protocol
Although these are designed to protect employee computing sessions and data, like IP addresses and passwords, from prying eyes., they don’t always achieve that goal
Employee VPN Usage
This weakness involves using default or factory configurations on hardware and software and failing to segment networks, set access controls on your applications, or patch immediately.
Network Misconfigurations
This code/software is designed to disturb normal or safe computing operations.
Malicious software
This is a technique used by threat actors to trick users into opening emails and clicking links inside them.
Email phishing
This Potocol allows users to use one computer to interface with another remote computer and control it.
Remote Desktop Protocol (RDP)
If this is unprotected it can allow thieves to steal credentials and log into business applications from coffee shops and other public locations
Wi-Fi Networks