Top 9 Cybersecurity Threats and Vulnerabilities - Compuquip (2024)

Eric Dosal February 13, 2020

Every business is under constant threat from a multitude of sources. From the biggest Fortune 500 companies down to the smallest of mom-and-pop stores, no business is 100% safe from an attack. The simple fact is that there are too many threats out there to effectively prevent them all.

For example, as noted by leading antivirus companyKaspersky Lab, “The number of new malicious files processed by Kaspersky Lab’s in-lab detection technologies reached 360,000 a day in 2017.” That’s 250 new malware threats every minute.

But, malware isn’t the only threat out there; there are many more cybersecurity threats and network vulnerabilities in existence that malicious actors can exploit to steal your company’s data or cause harm.

What is Vulnerability in Computer Security and How is It Different from a Cyber Threat?

To put it in the most basic terms, a computer system vulnerability is a flaw or weakness in a system or network that could be exploited to cause damage, or allow an attacker to manipulate the system in some way.

This is different from a “cyber threat” in that while a cyber threat may involve an outside element, computer system vulnerabilities exist on the network asset (computer) to begin with. Additionally, they are not usually the result of an intentional effort by an attacker—though cybercriminals will leverage these flaws in their attacks, leading some to use the terms interchangeably.

The way that a computer vulnerability is exploited depends on the nature of the vulnerability and the motives of the attacker. These vulnerabilities can exist because of unanticipated interactions of different software programs, system components, or basic flaws in an individual program.

Here are a few security vulnerability and security threat examples to help you learn what to look for:

1) Malware

As pointed out earlier, new malware is being created all the time. However, while the statistic of 360,000 new malware files a day sounds daunting, it’s important to know one thing: Many of these “new” malware files are simply rehashes of older malware programs that have been altered just enough to make them unrecognizable to antivirus programs.

Over the years, however, many different kinds of malware have been created, each one affecting the target’s systems in a different way:

  • Ransomware. This malicious software is designed to encrypt the victim’s data storage drives, rendering them inaccessible to the owner. An ultimatum is then delivered, demanding payment in return for the encryption key. If the ransom demand isn’t met, the key will be deleted and the data lost forever with it.
  • Trojans. This references a kind of delivery system for malware. A Trojan is any piece of malware that masquerades as a legitimate program to trick victims into installing it on their systems. Trojans can do a lot of damage because they slip behind your outermost network security defenses by posing as something harmless while carrying a major threat inside—like a certain infamous horse did to the city of Troy in Homer’s “Iliad.”
  • Worms. Worms are programs that can self-replicate and spread through a variety of means, such as emails. Once on a system, the worm will search for some form of contacts database or file sharing system and send itself out as an attachment. When in email form, the attachment is part of an email that looks like it’s from the person whose computer was compromised.

The goal of many malware programs is to access sensitive data and copy it. Some highly-advanced malwares can autonomously copy data and send it to a specific port or server that an attacker can then use to discreetly steal information.

Basic antivirus can protect against some malwares, but a multilayered security solution that uses antivirus, deep-packet inspection firewalls, intrusion detection systems (IDSs), email virus scanners, and employee awareness training is needed to provide optimal protection.

2) Unpatched Security Vulnerabilities

While there are countless new threats being developed daily, many of them rely on old security vulnerabilities to work. With so many malwares looking to exploit the same few vulnerabilities time and time again, one of the biggest risks that a business can take is failing to patch those vulnerabilities once they’re discovered.

It’s all too common for a business—or even just the individual users on a network—to dismiss the “update available” reminders that pop up in certain programs because they don’t want to lose the 5-10 minutes of productive time that running the update would take. Updating is a nuisance to most users. However, it’s a “nuisance” that could save a business untold amounts of time, money, and lost business later.

The easy fix is to maintain a regular update schedule—a day of the week where your IT team checks for the latest security patches for your organization’s software and ensures that they’re applied to all of your company’s systems.

3) Hidden Backdoor Programs

This is an example of an intentionally-created computer security vulnerability. When a manufacturer of computer components, software, or whole computers installs a program or bit of code designed to allow a computer to be remotely accessed (typically for diagnostic, configuration, or technical support purposes), that access program is called a backdoor.

When the backdoor is installed into computers without the user’s knowledge, it can be called a hidden backdoor program. Hidden backdoors are an enormous software vulnerability because they make it all too easy for someone with knowledge of the backdoor to illicitly access the affected computer system and any network it is connected to.

For example, a recent article by Bloomberg highlights a case where a security vulnerability that could be used as a backdoor was left in a manufacturer’s routers. According to the author:

“Europe’s biggest phone company identified hidden backdoors in the software that could have given Huawei unauthorized access to the carrier’s fixed-line network in Italy, a system that provides internet service to millions of homes and businesses… Vodafone asked Huawei to remove backdoors in home internet routers in 2011 and received assurances from the supplier that the issues were fixed, but further testing revealed that the security vulnerabilities remained."

This software vulnerability in the Huawei routers is concerning because, if used by malicious actors, it could give them direct access to millions of networks.

4) Superuser or Admin Account Privileges

One of the most basic tenets of managing software vulnerabilities is to limit the access privileges of software users. The less information/resources a user can access, the less damage that user account can do if compromised.

However, many organizations fail to control user account access privileges—allowing virtually every user in the network to have so-called “Superuser” or administrator-level access. Some computer security configurations are flawed enough to allow unprivileged users to create admin-level user accounts.

Verifying that user account access is restricted to only what each user needs to do their job is crucial for managing computer security vulnerabilities. Also, ensuring that newly-created accounts cannot have admin-level access is important for preventing less-privileged users from simply creating more privileged accounts.

5) Automated Running of Scripts without Malware/Virus Checks

One common network security vulnerability that some attackers learned to exploit is the use of certain web browsers’ (such as Safari) tendencies to automatically run “trusted” or “safe” scripts. By mimicking a trusted piece of code and tricking the browser, cybercriminals could get the browser software to run malware without the knowledge or input of the user—who often wouldn’t know to disable this “feature.”

While keeping employees from visiting untrustworthy websites that would run malware is a start, disabling the automatic running of “safe” files is much more reliable—and necessary for compliance with the Center for Internet Security’s (CIS’) AppleOS benchmark.

6) Unknown Security Bugs in Software or Programming Interfaces

Computer software is incredibly complicated. When two or more programs are made to interface with one another, the complexity can only increase. The issue with this is that within a single piece of software, there may be programming issues and conflicts that can create security vulnerabilities. When two programs are interfaced, the risk of conflicts that create software vulnerabilities rises.

Programming bugs and unanticipated code interactions rank among the most common computer security vulnerabilities—and cybercriminals work daily to discover and abuse them. Unfortunately, predicting the creation of these computer system vulnerabilities is nearly impossible because there are virtually no limits to the combinations of software that might be found on a single computer, let alone an entire network.

7) Phishing (Social Engineering) Attacks

In a phishing attack, the attacker attempts to trick an employee in the victim organization into giving away sensitive data and account credentials—or into downloading malware. The most common form of this attack comes as an email mimicking the identity of one of your company’s vendors or someone who has a lot of authority in the company.

For example, the attacker may say something like: “This is Mark from IT, your user account shows suspicious activity, please click this link to reset and secure your password.” The link in such an email often leads to a website that will download malware to a user’s computer, compromising their system. Other phishing attacks may ask users to give the attacker their user account credentials so they can solve an issue.

The basic goal of this strategy is to exploit an organization’s employees to bypass one or more security layers so they can access data more easily.

There are several ways to defend against this attack strategy, including:

  • Email Virus Detection Tools. To check email attachments for malware that could harm your network.
  • Multifactor Authentication (MFA). Using multiple authentication methods (such as biometrics, one-use texted codes, and physical tokens) for giving users access to your network makes it harder for attackers to hijack user accounts with just the username and password.
  • Employee Cybersecurity Awareness Training. An educated employee is less likely to fall for phishing schemes than one who doesn’t know basic cybersecurity protocols. Cybersecurity awareness training helps to provide employees with the basic knowledge they need to identify and avoid phishing attacks.
  • Defense in Depth. Using a defense-in-depth approach to network security adds extra layers of protection between each of the individual assets on the network. This way, if attackers bypass the outermost defenses of the network, there will still be other layers of protection between the compromised asset and the rest of the network.
  • Policy of Least Privilege. Enacting a policy of least privilege means restricting a user’s access to the minimum amount needed to perform their job duties. This way, if that user’s account privileges are misused, the damage will be limited.

8) Your IoT Devices

The Internet of Things (IoT) encompasses many “smart” devices, such as Wi-Fi capable refrigerators, printers, manufacturing robots, coffee makers, and countless other machines. The issue with these devices is that they can be hijacked by attackers to form slaved networks of compromised devices to carry out further attacks. Worse yet, many businesses don’t even realize just how many IoT devices they have on their networks—meaning that they have unprotected vulnerabilities that they aren’t aware of.

These unknown devices represent a massive opportunity to attackers—and, a massive risk for businesses.

To minimize the risk from IoT devices, a security audit should be performed that identifies all of the disparate assets on the network and the operating systems they’re running. This way, these IoT devices can be properly accounted for in the company’s cybersecurity strategy. Such audits should be performed periodically to account for any new devices that may be added to the network over time.

9) Your Own Employees

The biggest security vulnerability in any organization is its own employees. Whether it’s the result of intentional malfeasance or an accident, most data breaches can be traced back to a person within the organization that was breached.

For example, employees may abuse their access privileges for personal gain. Or, an employee may click on the wrong link in an email, download the wrong file from an online site, or give the wrong person their user account credentials—allowing attackers easy access to your systems.

Some of the same prevention techniques mentioned in the anti-phishing bullets can be applied to prevent data breaches caused by employees.

For example, using a policy of least privilege keeps users from having access to too much data at once, making it harder for them to steal information. Additionally, cybersecurity awareness training helps employees spot phishing attempts and other social engineering-style attacks so they won’t fall for them.

How to Find Security Vulnerabilities

One of the most important steps in preventing a security breach is identifying security vulnerabilities before an attacker can leverage them. But, many organizations lack the tools and expertise to identify security vulnerabilities. To help your business improve its cybersecurity, here are some tips for how to find security vulnerabilities:

How to Find Security Vulnerabilities: Audit Your Network Assets

To find security vulnerabilities on the business’ network, it is necessary to have an accurate inventory of the assets on the network, as well as the operating systems (OSs) and software these assets run. Having this inventory list helps the organization identify security vulnerabilities from obsolete software and known program bugs in specific OS types and software.

Without this inventory, an organization might assume that their network security is up to date, even though they could have assets with years-old vulnerabilities on them. Also, if a new security protocol is applied to assets on the network to close security gaps, but there are unknown assets on the network, this could lead to uneven protection for the organization.

For example, say that Servers A, B, and C get updated to require multi-factor authentication, but Server D, which was not on the inventory list, doesn’t get the update. Malicious actors could use this less-secure server as an entry point in an attack. Breaches have occurred in this manner before. As noted by The New York Times in an article about a major data breach affecting JPMorgan Chase bank, “Most big banks use a double authentication scheme, known as two-factor authentication, which requires a second one-time password to gain access to a protected system. But JPMorgan’s security team had apparently neglected to upgrade one of its network servers with the dual password scheme.”

When it comes to finding security vulnerabilities, a thorough network audit is indispensable for success.

How to Find Security Vulnerabilities: Penetration Testing

After completing the audit of the network and inventorying every asset, the network needs to be stress-tested to determine how an attacker might try to break it. Such penetration testing is how cybersecurity professionals check for security gaps so they can be closed before a malicious attack occurs.

The methodology behind a penetration test may vary somewhat depending on the organization’s network security architecture and cybersecurity risk profile—there is no true “one size fits all” approach to penetration testing. However, the general steps of a penetration test usually involve:

  1. Getting a “white hat” hacker to run the pen test at a set date/time.
  2. Auditing existing systems to check for assets with known vulnerabilities.
  3. The “hackers” running simulated attacks on the network that attempt to exploit potential weaknesses or uncover new ones.
  4. The organization running its incident response plan (IRP) to try and contain the “attacks” simulated during penetration testing.

In addition to identifying security vulnerabilities, the last item on the list can also help to find deficiencies in the company’s incident response. This can be useful for modifying response plans and measures to further reduce exposure to some cybersecurity risks.

How to Find Security Vulnerabilities: Creating a Threat Intelligence Framework

Penetration testing is highly useful for finding security vulnerabilities. However, it isn’t the only method companies should use. Another tool for identifying potential issues is the threat intelligence framework. This framework helps your organization:

  • Define what it needs to protect.
  • Set goals for overall network security.
  • Identify primary threat sources.
  • Refine cybersecurity protections.
  • Choose appropriate threat intelligence feeds to monitor new and emerging cyber threats and attack strategies.

Knowing what your biggest network security threats are is crucial for keeping your cybersecurity protection measures up to date. This is where many companies turn to a managed security services provider (MSSP), since these cybersecurity experts will often have tools and experience that make creating a threat intelligence framework easier.

Many MSSPs can provide penetration testing and vulnerability management services to quickly identify major network security issues—and then help their customers close those security gaps before an attacker can leverage them. MSSPs can also help create or modify incident response plans so companies can minimize the impacts if a network security breach does unfortunately occur.

Knowing what the biggest threats to your business are is the first step to protecting your (and your customers’) sensitive data. However, it takes a lot of hard work, expertise, and vigilance to minimize your cybersecurity risks. If you need help setting up a strong cybersecurity architecture to protect your business, contact Compuquip Cybersecurity today! We’re here to help you minimize your risks and protect your business.

Or, download our free cybersecurity guide at the link below:

Top 9 Cybersecurity Threats and Vulnerabilities - Compuquip (1)

Top 9 Cybersecurity Threats and Vulnerabilities - Compuquip (2024)

FAQs

What are the 10 common web security threats? ›

The 10 Most Common Web Attacks
  • Cross-Site Scripting. ...
  • SQL Injection Attacks. ...
  • Broken Authentication. ...
  • Drive-By Download. ...
  • Password-Based Attacks. ...
  • Fuzzing. ...
  • Using Components with Known Vulnerabilities. ...
  • DDoS (Distributed Denial-of-Service)
Mar 13, 2024

What are the 7 types of cyber security threats? ›

Types of cyberthreats
  • Malware. ...
  • Social engineering and phishing. ...
  • Man-in-the-Middle (MITM) attack. ...
  • Denial-of-Service (DoS) attack. ...
  • Zero-day exploits. ...
  • Password attack. ...
  • Internet of things (IOT) attack. ...
  • Injection Attacks.
Sep 1, 2023

What is 90% of cyber attacks? ›

Social engineering and phishing are involved in 70% to 90% of all successful cybersecurity attacks. No other initial root hacking cause comes close. This is not a recent development. Social engineering has been the number one type of attack since the beginning of networked computers.

What are the main cyber security threats? ›

Types of cyber threats your institution should be aware of include:
  • Malware.
  • Ransomware.
  • Distributed denial of service (DDoS) attacks.
  • Spam and Phishing.
  • Corporate Account Takeover (CATO)
  • Automated Teller Machine (ATM) Cash Out.

Which of the following are Owasp top 10 vulnerabilities? ›

The Top 10 OWASP vulnerabilities are:
  • Injection.
  • Broken Authentication.
  • Sensitive Data Exposure.
  • XML External Entities (XXE)
  • Broken Access control.
  • Security misconfigurations.
  • Cross Site Scripting (XSS)
  • Insecure Deserialization.
Feb 14, 2024

What is Owasp top 10? ›

The OWASP Top 10 is a regularly-updated report outlining security concerns for web application security, focusing on the 10 most critical risks. The report is put together by a team of security experts from all over the world.

What are the four main types of vulnerability in cyber security? ›

What are the 4 major types of security vulnerability?
  • Process (or procedural) vulnerabilities.
  • Operating system vulnerabilities.
  • Network vulnerabilities.
  • Human vulnerabilities.
Jan 12, 2024

What is the #1 cybersecurity threat today? ›

Social engineering attacks ("phishing")

Most IT security breaches result from social engineering in a business setting where criminals trick employees, suppliers, or other contractors into revealing confidential information, clicking on malicious links, or providing entry to secure IT systems.

What are the top cybersecurity threats in 2024? ›

A new report is predicting the top cybersecurity threats for 2024, noting the year could see an evolution in phishing strategies, a focus on the software supply chain and an exploitation of more widely used enterprise software like MOVEit.

What are three most common security threats? ›

Malware, including viruses, ransomware, and spyware, poses a significant threat to home users, capable of causing data loss, financial theft, and system damage.

What are the essential 8 cyber security? ›

The mitigation strategies that constitute the Essential Eight are: patch applications, patch operating systems, multi-factor authentication, restrict administrative privileges, application control, restrict Microsoft Office macros, user application hardening and regular backups.

What are the 5 D's of cyber security? ›

What are the 5 Ds of cybersecurity? The Cybersecurity and Infrastructure Security Agency (CISA) identified five objectives of adversaries who target industrial control systems (ICS) and operational technology (OT): to disrupt, disable, deny, deceive, and/or destroy.

What are the 6 D's of cyber security? ›

The 6 D's of cyber security to bolster your digital defense strategy — Deter, Detect, Defend, Deflect, Document and Delay. With these measures in place you can ensure top tier protection from malicious forces on the web.

What do most cyber attacks start with? ›

Fend Off Phishing : Learn how more than 90% of all cyber attacks begin with phishing. Find out how attackers leverage phishing attacks to gain access to protected systems, hosts, and networks. Discover how technology can be used to mitigate phishing attacks and train users to better recognize phishing emails.

What are the most recent cyber attacks? ›

New / recently added
  • Cyber attack on a city government in France.
  • Cyber attack on a traffic management system in Missouri, USA.
  • Mail account of a city government in Belgium hacked.
  • Facebook page of the local branch of a political party in Austria hacked.
  • Municipality in the Netherlands affected by attempted cyberattack.

What are the three classes of cyberattacks? ›

Not all cyber attacks are created equal and in this post we hope to shed some light on the "Big 3" types of cyber attacks, malware, ransomware, and phishing attacks.

What are the five types of cyber security? ›

Cybersecurity can be categorized into five distinct types:
  • Critical infrastructure security.
  • Application security.
  • Network security.
  • Cloud security.
  • Internet of Things (IoT) security.

Top Articles
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5784

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.