{"id":18031,"date":"2021-01-08T23:08:00","date_gmt":"2021-01-08T23:08:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18031"},"modified":"2022-05-03T20:32:47","modified_gmt":"2022-05-03T20:32:47","slug":"common-it-security-vulnerabilities-how-to-prevent-them","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/","title":{"rendered":"How to Defend Common IT Security Vulnerabilities"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">IT security pros have never faced more threats, whether it&#8217;s from the huge increase in <\/span><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\"><span style=\"font-weight: 400;\">remote work<\/span><\/a><span style=\"font-weight: 400;\"> or aggressive nation-state sponsored hackers like those involved in the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/fireeye-solarwinds-breaches-implications-protections\/\"><span style=\"font-weight: 400;\">SolarWinds breach<\/span><\/a><span style=\"font-weight: 400;\">. While there will always be new holes to plug, security vulnerabilities usually stem from the same few causes: unpatched vulnerabilities, misconfigurations or user error, and even the most tech-savvy companies are vulnerable to these mistakes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some of the most common IT security vulnerabilities and how to protect against them. By taking a proactive stance against the most common cyber vulnerabilities and security misconfigurations, you can prevent many cyber attacks from happening.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Common Vulnerabilities and Misconfigurations<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Here are a few of the more common vulnerabilities &#8211; and how to defend against them.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Missing data encryption<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When your data is not properly <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/disk-vs-file-encryption-which-is-best-for-you\/\"><span style=\"font-weight: 400;\">encrypted<\/span><\/a><span style=\"font-weight: 400;\"> before storage or transmission, your vulnerability to a cyber threat increases.<\/span><\/p>\n<p><b>Solution<\/b><i><span style=\"font-weight: 400;\">: <\/span><\/i><span style=\"font-weight: 400;\">While many software solutions exist to assist you with data encryption, you\u2019ll need to <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\"><span style=\"font-weight: 400;\">find an encryption solution that meets your needs<\/span><\/a><span style=\"font-weight: 400;\">. Also, be sure not to rely entirely on the tech. Human error is a common cause of this type of vulnerability, so be sure to roll out policies, training and audits to ensure data is protected.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">OS command injection<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">OS command injection, or shell injection, happens when an attacker executes operating system (OS) commands on your server while it\u2019s running an application. This vulnerability can be used\u00a0 to prey upon other parts of your infrastructure to gain deeper reach into your organization. It is typically caused by incorrect or complete lack of input data validation.<\/span><\/p>\n<p><b>Solution<\/b><i><span style=\"font-weight: 400;\">:<\/span><\/i><span style=\"font-weight: 400;\"> The best way to prevent OS command injection vulnerabilities is to never allow OS commands from application-layer code. If that is not possible, however, strong input validation protocols must be implemented, such as validating against a whitelist of permitted values, validating that the input is a number, validating that the input contains only alphanumeric characters, etc.<\/span><\/p>\n<p><b>Also Read<\/b><span style=\"font-weight: 400;\">: <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\"><span style=\"font-weight: 400;\">Top Active Directory Security Tools<\/span><\/a><\/p>\n<h3><span style=\"font-weight: 400;\">Buffer overflow<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Most software developers understand the threat posed by buffer overflow. Even still, the occurrence is common because of the wide variety of ways buffer overflows can occur, and the error-prone techniques often used to prevent them.<\/span><\/p>\n<p><b>Solution<\/b><span style=\"font-weight: 400;\">: For server products and libraries, diligently stay up to date on the latest bug reports for your systems. For custom apps, ensure that all code from users is reviewed to ensure that it can properly handle arbitrarily large input.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Missing authentication\/authorization<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This vulnerability is due to insufficient authorization or authentication limitations. Attackers step in to take advantage where weak authentication or privilege limitations exist.<\/span><\/p>\n<p><b>Solution<\/b><span style=\"font-weight: 400;\">: Many authentication vulnerabilities can be dealt with simply by tightening and fully implementing what you have. Beyond that, there are <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\"><span style=\"font-weight: 400;\">identity management<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\"><span style=\"font-weight: 400;\">privileged access management<\/span><\/a><span style=\"font-weight: 400;\"> tools, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\"><span style=\"font-weight: 400;\">multi-factor authentication<\/span><\/a><span style=\"font-weight: 400;\"> and other products that can help.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Cross-site scripting and forgery<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">CSRF, also referred to as XSS, XSRF, Sea Surf or Session Riding, tricks a web browser into executing an unwanted action. When it works, CSRF can impact both the business and its use.<\/span><\/p>\n<p><b>Solution<\/b><span style=\"font-weight: 400;\">: It\u2019s common to mitigate against this vulnerability with the use of randomly-generated <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/tokenization-vs-encryption\/\"><span style=\"font-weight: 400;\">tokens<\/span><\/a><span style=\"font-weight: 400;\">. For next-level protection, you can require double\u00a0 submission of cookies with random tokens assigned that must match before granting access to the application.<\/span><\/p>\n<p><b>Read Also<\/b><span style=\"font-weight: 400;\">: <\/span><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/prevent-xss-attacks\/\"><span style=\"font-weight: 400;\">How to Prevent Cross-Site Scripting (XSS) Attacks<\/span><\/a><\/p>\n<h3><span style=\"font-weight: 400;\">URL redirection to untrusted sites<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Redirects can leave the door open for attackers to drive users of your application to an untrusted external site, creating security issues for your user and leaving your reputation at risk.<\/span><\/p>\n<p><b>Solution<\/b><span style=\"font-weight: 400;\">: Use a <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-web-application-firewall-waf-vendors\/\"><span style=\"font-weight: 400;\">web application firewall<\/span><\/a><span style=\"font-weight: 400;\">, automated <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><span style=\"font-weight: 400;\">scanning<\/span><\/a><span style=\"font-weight: 400;\"> and keep your software up-to-date to work against this common vulnerability.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Path traversal<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Directory traversal (also known as file path traversal) is a common vulnerability that allows a potential attacker to read files on the server that is running your application, such as code and data, credentials for back-end systems and sensitive OS files.<\/span><\/p>\n<p><b>Solution<\/b><i><span style=\"font-weight: 400;\">: <\/span><\/i><span style=\"font-weight: 400;\">Prevent a directory traversal attack by avoiding the passing of user-supplied input to filesystem APIs, if possible. If complete avoidance is not possible then adding multiple layers of defense can help deter this type of attack. OWASP offers a number of additional <\/span><a href=\"https:\/\/owasp.org\/www-community\/attacks\/Path_Traversal\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">protective steps<\/span><\/a><span style=\"font-weight: 400;\"> and also has its own prominent list of <\/span><a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">web application vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Companies make common missteps that create security vulnerabilities, such as grabbing code from public sources like GitHub, Sourceforge and Bitbucket or failing to encrypt sensitive data. Acting promptly on software patches and updates also helps reduce vulnerabilities that cyber attackers wait to prey upon.<\/span><\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-conduct-a-vulnerability-assessment-steps-toward-better-cybersecurity\/\"><span style=\"font-weight: 400;\">Vulnerability assessment<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><span style=\"font-weight: 400;\">scanning<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-penetration-testing-tools\"><span style=\"font-weight: 400;\">penetration testing<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\"><span style=\"font-weight: 400;\">patch management<\/span><\/a><span style=\"font-weight: 400;\"> are important steps for controlling vulnerabilities. They should be conducting regularly, if not continuously.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Understanding Security Misconfigurations<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Misconfigured web servers and applications make easy targets for hackers to exploit. Misconfigurations can happen at any level of the tech stack &#8211; from your web server to its database to your framework or virtual machines. Cybercriminals take advantage of security misconfigurations through unauthorized access to default accounts, rarely accessed web pages, unprotected files and folders, directory listings, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is a relatively high chance that some security misconfigurations exist in your system at this very moment. If you want to see how common they are, just see this <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/apple-white-hat-hack-shows-value-of-pen-testers\/\"><span style=\"font-weight: 400;\">white-hat hack of Apple<\/span><\/a><span style=\"font-weight: 400;\"> from a few months ago. Businesses that use a hybrid approach of in-house and cloud environments can experience the highest level of risk exposure. Keeping a careful watch for security misconfigurations during the frequent updates is an essential factor for protection. Visibility and attention are key.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Common Types of Security Misconfigurations<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">These are some common misconfigurations that security and IT teams should be on the lookout for:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Applications and products under production phase in debug mode<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Running unwanted services on the system<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">No proper configuration for accessing server resources and services<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Leaving default keys and passwords as is<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incorrect exception management\u2014can disclose unauthorized data, including stack traces<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using default accounts with default credentials<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">How To Prevent Security Misconfigurations<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Preventing these types of security risks can be tricky. They are not always obvious and almost never intentional. A point person or committee, a protocol to follow when setting up new web applications, and a strong QA team can all contribute to prevention.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your system\u2019s vulnerabilities and misconfigurations offer an &#8220;in&#8221; for cybercriminals to\u00a0 gain access. It\u2019s that simple. And it\u2019s clear that cyber criminals are looking for these opportunities at an ever-increasing clip as well as getting savvier and savvier about how to find their way in. A lack of attention and safeguards for vulnerabilities and misconfigurations can leave a business wishing, in hindsight, that they had set up protocols to address issues, improve departmental communication flows and seek out weaknesses beforehand.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Further Reading: DDoS and SQL Injection Prevention and More<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Security tutorials are some of the most popular articles on eSecurity Planet. Here are some of the most popular:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-ddos-attacks\/\"><span style=\"font-weight: 400;\">How to Prevent DDoS Attacks<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-stop-ddos-attacks-tips-for-fighting-ddos-attacks\/\"><span style=\"font-weight: 400;\">Tips for Fighting DDoS Attacks<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-prevent-sql-injection-attacks\/\"><span style=\"font-weight: 400;\">How to Prevent SQL Injection Attacks<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/database-security-best-practices\/\"><span style=\"font-weight: 400;\">Database Security Best Practices<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dos-attacks\/\"><span style=\"font-weight: 400;\">How to Prevent DOS Attacks<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-prevent-dns-attacks\/\"><span style=\"font-weight: 400;\">How to Prevent DNS Attacks<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\"><span style=\"font-weight: 400;\">Best Malware Protection Practices<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/prevent-web-attacks-using-input-sanitization\/\"><span style=\"font-weight: 400;\">Prevent Web Attacks Using Input Sanitation<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/iaas-security-threats-and-protection-methodologies\/\"><span style=\"font-weight: 400;\">IaaS Security: Threats and Protection Methodologies<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-set-up-and-implement-dmarc-email-security\/\"><span style=\"font-weight: 400;\">How to Set Up and Implement DMARC Email Security<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/cloud\/data-storage-security-best-practices-for-security-teams\/\"><span style=\"font-weight: 400;\">Data Storage Security Best Practices<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/fine-tuning-firewall-rules-best-practices\/\"><span style=\"font-weight: 400;\">Fine-Tuning Firewall Rules<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-bucket-vulnerability\/\"><span style=\"font-weight: 400;\">Managing Cloud Bucket Vulnerabilities<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\"><span style=\"font-weight: 400;\">How to Control API Security Risks<\/span><\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n\n<div id=\"ta-campaign-widget-66d7008e89839-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7008e89839\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7008e89839\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7008e89839\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7008e89839\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7008e89839\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7008e89839\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IT security pros have never faced more threats, whether it&#8217;s from the huge increase in remote work or aggressive nation-state sponsored hackers like those involved in the SolarWinds breach. While there will always be new holes to plug, security vulnerabilities usually stem from the same few causes: unpatched vulnerabilities, misconfigurations or user error, and even [&hellip;]<\/p>\n","protected":false},"author":247,"featured_media":17798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,21,15],"tags":[5735,4218],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,379],"class_list":["post-18031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-cloud","category-threats","tag-application-security-2","tag-vulnerabilities","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Defend Common IT Security Vulnerabilities | ESP<\/title>\n<meta name=\"description\" content=\"Vulnerabilities and misconfigurations occur in every IT environment. Here are some common ones - and prevention steps security teams can take.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Defend Common IT Security Vulnerabilities | ESP\" \/>\n<meta property=\"og:description\" content=\"Vulnerabilities and misconfigurations occur in every IT environment. Here are some common ones - and prevention steps security teams can take.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-08T23:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-03T20:32:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jen Seitz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jen Seitz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\"},\"author\":{\"name\":\"Jen Seitz\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/30913dd1a86df2bcdbff12ab43c3c4ed\"},\"headline\":\"How to Defend Common IT Security Vulnerabilities\",\"datePublished\":\"2021-01-08T23:08:00+00:00\",\"dateModified\":\"2022-05-03T20:32:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\"},\"wordCount\":1223,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png\",\"keywords\":[\"application security\",\"vulnerabilities\"],\"articleSection\":[\"Applications\",\"Cloud\",\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\",\"name\":\"How to Defend Common IT Security Vulnerabilities | ESP\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png\",\"datePublished\":\"2021-01-08T23:08:00+00:00\",\"dateModified\":\"2022-05-03T20:32:47+00:00\",\"description\":\"Vulnerabilities and misconfigurations occur in every IT environment. Here are some common ones - and prevention steps security teams can take.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png\",\"width\":1200,\"height\":675,\"caption\":\"cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Defend Common IT Security Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/30913dd1a86df2bcdbff12ab43c3c4ed\",\"name\":\"Jen Seitz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5b085a444e5b37e5def5c2ce54d37aa3?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5b085a444e5b37e5def5c2ce54d37aa3?s=96&d=blank&r=g\",\"caption\":\"Jen Seitz\"},\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jseitz\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Defend Common IT Security Vulnerabilities | ESP","description":"Vulnerabilities and misconfigurations occur in every IT environment. Here are some common ones - and prevention steps security teams can take.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/","og_locale":"en_US","og_type":"article","og_title":"How to Defend Common IT Security Vulnerabilities | ESP","og_description":"Vulnerabilities and misconfigurations occur in every IT environment. Here are some common ones - and prevention steps security teams can take.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/","og_site_name":"eSecurity Planet","article_published_time":"2021-01-08T23:08:00+00:00","article_modified_time":"2022-05-03T20:32:47+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png","type":"image\/png"}],"author":"Jen Seitz","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jen Seitz","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/"},"author":{"name":"Jen Seitz","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/30913dd1a86df2bcdbff12ab43c3c4ed"},"headline":"How to Defend Common IT Security Vulnerabilities","datePublished":"2021-01-08T23:08:00+00:00","dateModified":"2022-05-03T20:32:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/"},"wordCount":1223,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png","keywords":["application security","vulnerabilities"],"articleSection":["Applications","Cloud","Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/","url":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/","name":"How to Defend Common IT Security Vulnerabilities | ESP","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png","datePublished":"2021-01-08T23:08:00+00:00","dateModified":"2022-05-03T20:32:47+00:00","description":"Vulnerabilities and misconfigurations occur in every IT environment. Here are some common ones - and prevention steps security teams can take.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/11\/hacking-3112539_1920-e1610757696693.png","width":1200,"height":675,"caption":"cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Defend Common IT Security Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/30913dd1a86df2bcdbff12ab43c3c4ed","name":"Jen Seitz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5b085a444e5b37e5def5c2ce54d37aa3?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b085a444e5b37e5def5c2ce54d37aa3?s=96&d=blank&r=g","caption":"Jen Seitz"},"url":"https:\/\/www.esecurityplanet.com\/author\/jseitz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18031"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/247"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18031"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18031\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/17798"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18031"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18031"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18031"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}