Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)OST B Discussion Lesson 10

#98336
Latoya Stoudmire
Participant

Mobile devices have vulnerabilities that can allow hackers access to sensitive information. Improper credential usage is a vulnerability that leaves user data accessible. This occurs when credentials are used incorrectly or are hardcoded. (Asee 2023) insufficient input and output validation is a vulnerability that does not validate data input from outside sources. When the incoming data is not validated, hackers can access sensitive data. Another vulnerability mobile devices face is inadequate privacy control. Inadequate privacy control correlates closely with personal identifiable information (PII). If users PII is leaked it leaves devices vulnerable to attacks. If hackers can access a person’s financial information this could result in unauthorized transactions that could be financially devastating. Ways to prevent these types of attacks are by keeping your mobile device updated, adding more security authentication.

Physical hardware is also susceptible to vulnerability. Outdated device firmware can lead to being plagued by bugs and security flaws. Wright (2023) Lack of encryption can also lead to attacks on physical hardware. When an organization grows it can sometimes add innovative technology that does not have a strong encryption. This leaves companies vulnerable to attacks. A way to prevent these types of vulnerability is to ensure you buy hardware from a reputable vendor, enforcing access control areas where hardware is placed, and adding weekly vulnerability scanning. Wright (2023)

Wright, K. (2023, January 13). Top 10 hardware vulnerabilities MSPs should watch out for. inSOC. https://in-soc.com/blog/top-10-hardware-vulnerabilities-msps-should-watch-out-for/

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.