5 IT vulnerabilities you should know about
Despite the fact that cybersecurity is making efficient progress every year, it is true that hackers persist. They always will. Even more so if there are still black holes, blind spots and recurring IT vulnerabilities in companies and administrations around the world. Let's look at some of the most important ones below.
If you found this post interesting, you might also be interested in this one free PDF guide: AWS for Disaster Recovery
Major IT vulnerabilities
Outdated equipment
Obsolete hardware and software, expired media, applications that are not updated… a whole cocktail that increases the vulnerability of systems.
Note: 79% of companies in the world still run Windows 7 on at least one computer, which has been withdrawn from the market for years. It is well known that The more system updates, the lower the security risk.
Poor or limited use of data encryption
Although it is widely believed that encryption helps us protect our data wherever it resides, it is true that only 17% of companies use it to protect themselves from external threats, a very poor figure.
The cause is clear: To encrypt you have to invest and the top management of companies is not always willing to do so.
The dangers of poorly implemented cloud computing
Cloud computing, that is, hosting our work tools, communications and all business services in an online cloud, is a huge window for data theft. That is why companies are advised to take extreme precautions by training their employees and creating a system that guarantees security tools.
There are security threats of all kinds: from the human factor (incompetence, intentional problems or passwords that are easy to guess), to purely physical problems, unprotected backups, to remote services... everything has an influence and that is why it is necessary to establish protocols for the use of our cloud.
This is why it is highly recommended to have platforms that ensure high availability and security, as is the case with Amazon Web Services, in addition to having trusted partners to help us manage it.
Lack of training and skills in users
We have mentioned this in several points of this text, but we want to emphasize it. Many companies do not take care of their employees as they should. Education is important in this matter: how we should use our networks, what precautions we should take with our data, what protection methods exist... all of this must be learned by the worker. Also informing him of how data theft is practiced, what techniques are used for it. What is phishing? And ransomware? Training never hurts, it is an added value that pays off in the long run.
The scarce presence of security experts
Companies and administrations have limited staff. It is not always possible to rely on an IT security expert. Small companies, many of which cannot afford to hire such a person, are more exposed to this type of online threat. Some do not even have an annual budget for external consultants who can resolve an emergency on a one-off basis.
What are the main security measures?
From the classic use of firewalls to block ports, to antispam systems or updating equipment and devices, to the already mentioned full-scale IT outsourcing, anything goes to protect us.
But the main measure is very basic: it is necessary a security policy, that is, the business owner in question must commit to security and dedicate resources to it. We must also protect mobile devices and personal systems that provide access to the work network and confidential data. We must use a secure Wi-Fi network, as well as applications that have a reliable origin.
Cybersecurity, by the way, needs a Continuity and compliance plan to devote some time to training updates and backing up company data.



