{"id":36012,"date":"2019-11-14T17:25:10","date_gmt":"2019-11-14T21:25:10","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=36012"},"modified":"2023-04-20T23:03:12","modified_gmt":"2023-04-21T03:03:12","slug":"common-security-issues","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/","title":{"rendered":"Common IT Security Issues"},"content":{"rendered":"<h2>When it comes to your network&#8217;s IT security and protecting sensitive data and vital information, learn some of the most common issues.<\/h2>\n<p>Cybersecurity is a subject on almost every business leader\u2019s mind today. It\u2019s easy to see why. The number of businesses experiencing an attack increased by\u00a0more than 15 percent last year alone.<\/p>\n<p>The increasing number of attacks has put everyone on high alert. Governments are now passing new laws to improve data management. Business owners look to lock up their data.<\/p>\n<p>The reality for many small business owners, though, is that IT security isn\u2019t cheap. If you have a limited budget, you need to know how to spend it.<\/p>\n<p>Luckily, we\u2019ve rounded up this list of the most common IT security issues facing you and your company. With this knowledge in hand, you can work on creating a strategy to address these very real threats.<\/p>\n<h2><b>Phishing Attacks Are Evolving<\/b><\/h2>\n<p>If you haven\u2019t read the IT security news recently, you might think viruses and worms are the biggest threats.<\/p>\n<p>Social engineering is probably more common and more dangerous for your business. One common tactic is the phishing attack.<\/p>\n<p>With a phishing attack, cybercriminals turn to individual users to give them the information they want. The criminals pose as a trusted source. This might be a financial institution or a well-known website.<\/p>\n<p>They often send an email, which may look quite official at first glance. The sender asks the user for account or financial information. If the user falls for the trick, they send sensitive information to the sender.<\/p>\n<h3><b>The Rise of Spear Phishing<\/b><\/h3>\n<p><a href=\"https:\/\/www.pcmag.com\/article\/354240\/spear-phishing-attacks-what-you-need-to-know\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-36013 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/spear-phishing-attacks-what-you-need-to-know.jpg\" alt=\"spear-phishing-attacks-what-you-need-to-know\" width=\"810\" height=\"456\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/spear-phishing-attacks-what-you-need-to-know.jpg 810w, https:\/\/www.andysowards.com\/blog\/assets\/spear-phishing-attacks-what-you-need-to-know-768x432.jpg 768w\" data-sizes=\"(max-width: 810px) 100vw, 810px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 810px; --smush-placeholder-aspect-ratio: 810\/456;\" \/><\/a><br \/>\n<em>Spear-Phishing Attacks: What You Need to Know<\/em><\/p>\n<p>Phishing attacks have moved away from being mass emailing campaigns. They&#8217;re becoming highly targeted messages, which is known as spear phishing.<\/p>\n<p>In a spear-phishing attack, the criminal will track their target for some time. They put far more effort into crafting a message that\u2019s more likely to fool the victim.<\/p>\n<p>How can your team protect against phishing and other types of social engineering? The best possible thing to do is to train your team. Help them recognize and avoid threats, then report suspicious emails or messages.<\/p>\n<h2><b>DoS and DDoS Damage Businesses<\/b><\/h2>\n<p>Phishing attacks and social engineering focus on your people. They&#8217;re often the weakest links in the security chain.<\/p>\n<p>Denial of Service and Distributed Denial of Service attack a different part of the chain. In this case, DoS and DDoS attack your servers.<\/p>\n<p>These attacks are fairly easy for cybercriminals to carry out. They cause huge headaches for any web-based business. If your website is your only source of revenue, you want to protect yourself against DoS and DDoS attacks.<\/p>\n<p>How do these attacks happen? A criminal uses a machine to send many requests to your web servers. The idea is to flood the server, overloading it and making it inaccessible to legitimate users.<\/p>\n<p>Today, it\u2019s difficult to take down a server with one machine. Cybercriminals have adjusted to this reality. They instead use DDoS to bring down your servers.<\/p>\n<p>A DDoS attack uses many devices to flood your server. In some cases, there may be hundreds or thousands of devices sending requests.<\/p>\n<p>In these cases, it\u2019s likely the criminal has used malware to take control of other people\u2019s devices. This creates what\u2019s known <a href=\"https:\/\/www.howtogeek.com\/183812\/htg-explains-what-is-a-botnet\/\" target=\"_blank\" rel=\"noopener\">as a botnet<\/a>.<\/p>\n<p>DDoS attacks are more difficult to overcome than DoS attacks because there are many IP addresses. It can be difficult to sort legitimate users from botnet requests.<\/p>\n<h2><b>Malware is More Versatile than Ever<\/b><\/h2>\n<p><a href=\"https:\/\/www.popsci.com\/antivirus-software-protect-your-computer\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-36014 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/antivirus-software-protect-your-computer-1024x682.jpeg\" alt=\"antivirus-software-protect-your-computer\" width=\"1024\" height=\"682\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/antivirus-software-protect-your-computer-1024x682.jpeg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/antivirus-software-protect-your-computer-768x512.jpeg 768w, https:\/\/www.andysowards.com\/blog\/assets\/antivirus-software-protect-your-computer.jpeg 1034w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/682;\" \/><\/a><br \/>\n<em>Your anti-virus software is not enough<\/em><\/p>\n<p>Malware may not be the buzzword on everyone\u2019s lips these days, but don\u2019t let that fool you. Malware is still at large, and the category is broader than ever.<\/p>\n<p>Malware is any unwanted software installed on your system. It can take many forms:<\/p>\n<ul>\n<li>Viruses, worms, and Trojans<\/li>\n<li>Adware<\/li>\n<li>Spyware<\/li>\n<li>Ransomware<\/li>\n<li>File and system infectors<\/li>\n<\/ul>\n<p>In some cases, malvertising may be considered malware as well. This involves the hackers adding malicious code to an advertising website or network.<\/p>\n<p>All these applications have one thing in common. The malicious code, file, or software allows the system to be hijacked. This may result in the loss of data or a complete shutdown of the system.<\/p>\n<p>In some cases, it stops certain programs from functioning. In the case of ransomware, users are locked out of the system. The program must be removed or the ransom paid before access is restored.<\/p>\n<p>IT consulting can help you design a system that is malware resistant. You still need to train your team to practice good cybersecurity. The right hardware and software, though, can make a world of difference.<\/p>\n<h2><b>Man-in-the-Middle Attacks Remain Common<\/b><\/h2>\n<p>One of the most common forms of cyberattacks is the man-in-the-middle, or MitM attack. In this scenario, a cybercriminal sets up between a client and a server. They then interrupt communications between client and server.<\/p>\n<p>MitM attacks take a few different forms:<\/p>\n<ul>\n<li>Session hijacking: A hijacker disconnects the client from the server and pretends to be the client.<\/li>\n<li>IP spoofing: An attacker poses as a trusted entity to access sensitive information.<\/li>\n<li>An attacker intercepts and saves old messages, then impersonates one of the participants.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.techrepublic.com\/article\/man-in-the-middle-attacks-a-cheat-sheet\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"size-full wp-image-36015 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/man-in-the-middle-attacks-a-cheat-sheet.jpg\" alt=\"man in the middle security breach\" width=\"770\" height=\"522\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/man-in-the-middle-attacks-a-cheat-sheet.jpg 770w, https:\/\/www.andysowards.com\/blog\/assets\/man-in-the-middle-attacks-a-cheat-sheet-768x521.jpg 768w\" data-sizes=\"(max-width: 770px) 100vw, 770px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 770px; --smush-placeholder-aspect-ratio: 770\/522;\" \/><\/a><br \/>\n<em>Man-in-the-middle attacks: A cheat sheet<\/em><\/p>\n<p>MitM attacks are usually countered with encryption, but this isn\u2019t always enough. Digital certificates and hashing can also help.<\/p>\n<h2><b>IT Security Must Prepare for an SQL Injection Attack<\/b><\/h2>\n<p>If your website is driven by a database, you may be subject to what\u2019s known as an SQL injection attack. Older interfaces associated with PHP and ASP applications are especially vulnerable. Any site using dynamic SQL may be open to exploitation.<\/p>\n<p>In this type of attack, a hacker sends SQL commands to the server through a form on your website. The server executes these predefined commands, returning the requested information.<\/p>\n<p>SQL injection attacks can read sensitive information from the database. In some cases, this is the account information of many users. A hacker may also use the attack to change database records or even shut down the database.<\/p>\n<p>To protect your system, you should put in place a least-privilege model of permissions. Avoid dynamic SQL in your stored procedures, and confirm input data against a white list in your app.<\/p>\n<h2><b>Cross-Site Scripting Exploits Web Resources<\/b><\/h2>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/google-working-on-new-chrome-security-feature-to-obliterate-dom-xss\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-36016 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/google-working-on-new-chrome-security-feature-to-obliterate-dom-xss.png\" alt=\"google-working-on-new-chrome-security-feature-to-obliterate-dom-xss\" width=\"770\" height=\"485\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/google-working-on-new-chrome-security-feature-to-obliterate-dom-xss.png 770w, https:\/\/www.andysowards.com\/blog\/assets\/google-working-on-new-chrome-security-feature-to-obliterate-dom-xss-768x484.png 768w\" data-sizes=\"(max-width: 770px) 100vw, 770px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 770px; --smush-placeholder-aspect-ratio: 770\/485;\" \/><\/a><br \/>\n<em>Google working on new Chrome security feature to &#8216;obliterate DOM XSS&#8217;<\/em><\/p>\n<p>Cross-site scripting makes use of third-party web resources to run scripts in your browser. Other applications can also be compromised.<\/p>\n<p>The attacker does this by adding malicious JavaScript to a website\u2019s database. Whenever a page is requested from the infected site, the attacker\u2019s JavaScript is transmitted along with the page. The malicious script is then executed.<\/p>\n<p>Some attacks will reroute a browser or app to the attacker\u2019s server. XSS can also be used to exploit more vulnerabilities in the victim\u2019s system. This allows the attacker to:<\/p>\n<ul>\n<li>Steal cookies<\/li>\n<li>Log keystrokes<\/li>\n<li>Capture screenshots<\/li>\n<li>Collect network information<\/li>\n<li>Control the victim\u2019s device<\/li>\n<\/ul>\n<p>JavaScript isn\u2019t the only way to carry out an XSS attack, although it is one of the most common. VBScript, ActiveX, and Flash can also be exploited this way.<\/p>\n<p>There are various methods for preventing XSS attacks. You can talk to your website development team or your IT consultants about your options.<\/p>\n<h2><b>Advanced Persistent Threats Are Long-Term Risks<\/b><\/h2>\n<p>Advanced Persistent Threats, or APTs, are what many people think of when it comes to cyber threats. These attacks usually take the form of code that is entered onto an unsuspecting system. The code then proceeds to run in the background, often undetected for months.<\/p>\n<p>APTs aren\u2019t idle, though, and the longer they go undetected, the more sensitive data they\u2019ve stolen. APTs discover login credentials, then use this to penetrate deeper into your systems.<\/p>\n<p>APTs often ride in on malware or exploit kits. You may think you\u2019ve removed the threat after you\u2019ve dealt with ransomware or file infector. The APT is still there.<\/p>\n<p>Detection is possible. Ask your network administrators to keep an eye on network activity. Unusual network activity or large amounts of data access often show the presence of an APT.<\/p>\n<p>Your IT team can also help by segmenting your network to protect critical data. Honeypots can trap internal attacks. White lists limit data access to a few applications.<\/p>\n<h2><b>The Dark Web Gave Rise to Exploit Kits<\/b><\/h2>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-36017 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg\" alt=\"giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks\" width=\"770\" height=\"578\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg 770w, https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks-768x576.jpg 768w\" data-sizes=\"(max-width: 770px) 100vw, 770px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 770px; --smush-placeholder-aspect-ratio: 770\/578;\" \/><\/a><br \/>\n<em>Giant ransomware bundle threatens to make malware attacks easier for crooks<\/em><\/p>\n<p>Hacking is usually portrayed as requiring some effort from the hackers. You might picture someone typing away, trying password combinations or different codes.<\/p>\n<p>Cybercriminals are always looking for ways to make hacking easier. That&#8217;s what led to the rise of exploit kits. These kits are sold on the dark web, and they\u2019re designed to automate cybercriminal activity.<\/p>\n<p>While this takes away from the hacker mystique, it makes them all the more dangerous. Exploit kits increase the success rate of attacks and improve efficiency. Cybercriminals using exploit kits can attack more users.<\/p>\n<p>Discovering an exploit kit can be difficult since they\u2019re meant to be discreet. Software and human solutions can help you protect your systems against these attacks.<\/p>\n<h2><b>\u00a0Build Security in to Your Business Plan<\/b><\/h2>\n<p>As you can see, IT security threats come in all shapes and sizes. You and your team need to be on guard almost constantly.<\/p>\n<p>Whether you\u2019re developing a website or an app, security should be on your mind. Check out more of our resources to discover how to build security right into everything your business does.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to your network&#8217;s IT security and protecting sensitive data and vital information, learn some of the most common issues. Cybersecurity is a subject on almost every business<\/p>\n","protected":false},"author":1,"featured_media":36017,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,1,5633],"tags":[5891,11170,7846,8503,6557,10215,6020,6388,8492,974,6696,6249,4368,9389,11173,11174,425,114,20,10096,7850,9273,11171,118,9652,177,11172,5879,21,115],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Common IT Security Issues<\/title>\n<meta name=\"description\" content=\"When it comes to your network&#039;s IT security and protecting sensitive data and vital information, learn some of the most common issues. Cybersecurity is a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common IT Security Issues\" \/>\n<meta property=\"og:description\" content=\"When it comes to your network&#039;s IT security and protecting sensitive data and vital information, learn some of the most common issues. Cybersecurity is a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-14T21:25:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-21T03:03:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/\",\"name\":\"Common IT Security Issues\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg\",\"datePublished\":\"2019-11-14T21:25:10+00:00\",\"dateModified\":\"2023-04-21T03:03:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"When it comes to your network's IT security and protecting sensitive data and vital information, learn some of the most common issues. Cybersecurity is a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common IT Security Issues\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common IT Security Issues","description":"When it comes to your network's IT security and protecting sensitive data and vital information, learn some of the most common issues. Cybersecurity is a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/","og_locale":"en_US","og_type":"article","og_title":"Common IT Security Issues","og_description":"When it comes to your network's IT security and protecting sensitive data and vital information, learn some of the most common issues. Cybersecurity is a","og_url":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2019-11-14T21:25:10+00:00","article_modified_time":"2023-04-21T03:03:12+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/","url":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/","name":"Common IT Security Issues","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg","datePublished":"2019-11-14T21:25:10+00:00","dateModified":"2023-04-21T03:03:12+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"When it comes to your network's IT security and protecting sensitive data and vital information, learn some of the most common issues. Cybersecurity is a","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/giant-ransomware-bundle-threatens-to-make-malware-attacks-easier-for-crooks.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2019\/common-security-issues\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Common IT Security Issues"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/36012"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=36012"}],"version-history":[{"count":2,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/36012\/revisions"}],"predecessor-version":[{"id":46060,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/36012\/revisions\/46060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/36017"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=36012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=36012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=36012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}