Because we live in a world where everything is connected, networks can be definitely be vulnerable in many ways. One vulnerability is weak or as I call them “immature” passwords. If I pick a simple passwords and or reuse that same simple password across multiple accounts, it then becomes easier for someone to guess or obtain them. Another vulnerability is outdated systems. I used to ignore my macOS updates religiously until my uncle, a Senior Software Engineer helped me to understand how unsafe it is. I found out, there really are humans in this world, who are waiting on moments when updates are ignored; because known security holes stay open and attackers often look specifically for those weaknesses. A third vulnerability is unsecured wireless networks. If my Wi-Fi is not configured with strong encryption, unauthorized users could be able to connect or, even intercept data given. A third vulnerability is unsecured wireless networks. If Wi-Fi is not configured with strong encryption, anyone may be able to connect or even intercept data being transmitted. For example, with my Spectrum internet at home, if I never changed the default router password or didn’t use strong encryption like WPA2 or WPA3, someone nearby could possibly connect to my network without me knowing. This can slow down my internet, but more importantly, it could put my personal information at risk.
There are several methods and controls I believe can help reduce these risks and better protect a network. One important control is using strong authentication, including complex passwords vs simple ones and multi factor authentication. This adds another layer of protection and makes it harder for someone to gain access. Another method is regular patching and system updates, which help fix security flaws before they can be exploited. A third control is using firewalls and monitoring tools to filter traffic and alert for suspicious activity.
There is no one solution that protects everything, however, when multiple controls are used together, the network becomes much harder to compromise.



