Privacy_Data_Protection
Privacy_Data_Protection
#4.3.C:
Security Misconfiguration
If a computing system does not have security settings properly
defined, or is kept with the default username and password, a
security misconfiguration occurs. This typically means that a
system’s configuration does not comply with security
standards, such as CIS benchmarks, the OWASP Top 10, or
specific compliance requirements.
Shadow IT
Unauthorized use of third-party software, applications, or
Internet services in the workplace, known as shadow IT, is
difficult for IT departments to track. Shadow IT is very
common because employees habitually use applications they
know from their personal lives, which are more efficient,
lightweight, and easier to use than company-approved
alternatives.
Ransomware
Ransomware is a top priority, if not the highest priority, in any
organization’s cybersecurity program, and it directly affects
data security. In a ransomware attack, the victim’s computer
is infected by malware that encrypts valuable files, or entire
devices, making it impossible for victims to use the equipment
and data. To regain access to the device or data, ransomware
demands that the victim pay a ransom.
$.3C3: