

So people who installed and maintained the server were not qualified to do that. System administrators in this case was average at best, and even NIST recommendations were ignored in And the level of stupidity and greed cannot be overestimated. IT represents a significant and underappreciated danger. Hillary Clinton email scandal which demonstrated that shadow

With the most recent, most stunning example Stupidity/gullibility of users in a large organization. Optimal entry point for a determined hacker into corporate or some other networks. Which means that home networks of system administrators often represent the weakest link in corporate security and the

Use completely separate, not connected to home network computer to work with corporate server. True even for home netwrk of system administrators, who are lazy enough to configure VPN for connection with the organization and That means that the usage of a proxy server after the rounter (using some kind ofįirewall Micro Appliance ) for internet access now should be viewed as the necessary evil, as theīut unfortunately in home networks they are not widely used, mostly because the user lack the necessary skills. Internet routers are now the most common point of attacks Vulnerable then individual Linux servers or desktops. Also routers, switches and even network printers can be as vulnerable or even more General architecture of a particular network segment, especially set of ports opened across the It is generally stupid to talk about individual vulnerabilities without taking into account the
