It is your mistakes that the opportunistic threat actor is waiting for.

One of the things I cover with clients is misconfiguration of systems – small businesses (and sometimes large) often think they know what they are doing and so set hardware and software without experience. One example of this is the amount of reconfiguration our team has to carry out on Microsoft 365 accounts and SharePoint authorisation, when we take over a job.

Opportunistic attackers have begun to rely on these accidents and misconfigurations as it has become easy and inexpensive to find any vulnerabilities, exposures or other unknown open doors. 

Abhishek Anbazhagan, Palo Alto Networks

2022 ASM Threat Report (paloaltonetworks.com)

Clive Catton MSc (Cyber Security) – by-line and other articles

Please Note:

I am on leave so the news this week is “in brief”. You can still contact me via the contact page and Octagon Technology.