Unpatched Software, When systems or apps are not updated, leaving known vulnerabilities open to exploitation, Zero Day Exploits, Attack exploiting an unknown or unpatched software flaw, Multi-Factor Authentication, Adding an extra verification factor, Intrusion Detection, Monitors network traffic to detect abnormal activity, Prevention Systems, Actively blocks suspicious traffic or known exploit patterns, Weak Authentication, Use of simple or reused passwords allowing easy compromise..

Leaderboard

Visual style

Options

Switch template

)
Continue editing: ?