|
Back in the saddle again
Join Date: Oct 2001
Location: Central TX west of Houston
Posts: 57,130
|
I'd say it's primarily 2 routes.
1 Servers and IT gear that are not patched up to date. Lots of folks don't keep up on updates and patching which often leaves security holes and vulnerabilities available for hackers.
2 Possibly used even more frequently than #1 the human security vulnerability. Phishing, trojans, etc... Trick some employee out of their credentials or send an email with a malicious tool that provides access or information that will provide access.
__________________
Steve
'08 Boxster RS60 Spyder #0099/1960
- never named a car before, but this is Charlotte.
'88 targa  SOLD 2004 - gone but not forgotten
|