Presentation 1
Presentation 1
1. Device theft or lost- Personal data can be easily stolen from those
devices.
2. Weak and stolen credentials- By this hackers can get access to the
unauthorized data.
3. Internet spyware- Clicking on a link without any verification might
cause major issues like unauthorized access to the system and transfer
of data without anyone’s knowledge.
4. Vulnerable systems and applications- If systems and applications are
not monitored on a regular, even if any issue occurs nobody will have
any idea about it.
5. Change in systems – the new systems are useless if employees do not
know how to handle them.
6. Insufficient testing – Not properly checking if the system is working or
not can cause serious issues.
7. Insufficient Risk management - identification and analysis of the risk is
a complex process which needs proper attention.