The Raritan Blog

Weak Links in Security Part 1: Configuration Is the Biggest Security Threat

Posted on March 28, 2018 by Richard Dominach

The rise in cyberattacks and ransomware thefts has caused businesses to shore up their IT infrastructure defenses. While the boost in security protocols is a step in the right direction, many businesses are unaware of a key threat -- improperly configured IT devices and systems. For example, postponing or altogether forgetting to change a default password can leave your vital business data ripe for the taking.