Today’s corporate networks look so different from the networks of yesteryear that they’re almost not even comparable any more.

In olden times, when the personal computer was a relatively new invention and networks were just beginning to form, they were homogenous and tightly controlled. They were nearly hermetically sealed digital environments with strong digital walls and gateways in place to keep would-be intruders out, and for the most part, they were successful.

That bears little resemblance to the corporate networks of today, which are highly segmented and anything but homogenous. Most companies have some form of BYOD (Bring Your Own Device) policy in place, allowing a multitude of device types into the ecosystem.

Add to that mix a variety of cloud-based services and an expanding array of “smart” internet objects, and even a modestly sized company’s exposure is orders of magnitude what it once was.

Unfortunately, as systems get more complex, they also get easier to breech.

According to recent studies, a relative lack of network password security represents the biggest threat corporate networks face. In too many cases, default passwords are never changed, and if those passwords are changed, they’re often ridiculously easy to guess.
In fact, the top five “password guesses” hackers make when attempting to breach a system via brute force are:

• Root
• Admin
• Ubnt (short for Ubuntu)
• 123456
• And Support

Sadly, these guesses prove correct as often as not, which underscores an area of painful weakness for too many companies.

The bottom line is that no matter how many experts you hire, and no matter how much you spend on digital security, it’s only as good as the weakest link in the chain. If a critical server is guarded by a password as simple as “Admin,” then you’re in real trouble, and your data is at risk.

If you’re worried about the state of your company’s digital security, give us a call today and speak with one of our seasoned experts. We can assess your current needs and chart a course for you to greater peace of mind and more robust digital security.

Used with permission from Article Aggregator