End users – social engineering and manipulation of users
Theft of equipment such as hard disks, USB drives, laptops etc.
Dumpster Diving
Insecure network infrastructure
Insecure wireless routers
Weak network protocols
Use of unencrypted network analysers
Poorly configured operating systems and applications
Weak encryption
Missing updates and patches
Weak passwords
Default user accounts
Poor file system security
Open ports
Poorly configured applications and associated protocols (HTTP, SMTP)
Poorly configured firewalls
VOIP
Insecure files