Old tricks still work

Old tricks still work

Whilst the security landscape suggests that we all continue to face increasingly complex threats the truth is many old and simple ones still work well.

In 2023 over 26,000 vulnerabilities were reported. Indeed 50% of the 206 high-risk vulnerabilities were used by ransomware gangs to exploit their victims' networks.

The remediation time for these? On average 58 days.

As we look further though cybercriminals can just leverage ones we have not addressed yet.

But why?

Now, I carry no ethical hacker certs or anything fancy like that. However, a quick Shodan query showed me several Windows Server 2016 devices that are possibly open to be exploited. All of which I could throw a rock at from my office.

So it's clear that hitting an organization with a cyber security incident isn't too hard. Some of the easy ones that require little work-

  1. Old Windows server OS such as Server 2012, server 2016 etc.
  2. Log4j - yes it's still a thing.
  3. Misconfigurations are changes made that would make your organization open to attack. Left and never addressed.
  4. MFA is not set up or as I see often only set up for some users and not others.
  5. Phishing still works well, users are still submitting data and clicking on links.

Until we get the basics right then sophisticated attacks are the least of our worries.

One of the locations on my quick search included a healthcare organization with around 12 locations, they can surely easily afford to be doing the right thing right? Yet we think we are good until someone helps us understand we are not.

Fixing this trend

As the saying goes you cannot address what you do not know about, so constant vulnerability scanning would be a start.

Understanding where you are vulnerable is key to addressing these gaps and, finally, the leadership support to make the financial commitments you have to tackle.

Countless times IT companies run a vulnerability scan, report it to a business owner and they just shrug their shoulders. You might want to make a quick exit if you are sitting on the other side of that table.

Next time an organization gets hit with ransomware or suffers a data breach, it most likely was not a very complex attack. You made it simple.

Securely yours,

Scott

To view or add a comment, sign in

More articles by Scott Huxley

  • Tired of Taking Meeting Notes?

    Tired of Taking Meeting Notes?

    For those of us who attend regular virtual meetings or at least several of them each week, both internal and external…

  • AI Is Moving Fast. Is Your Business Ready?

    AI Is Moving Fast. Is Your Business Ready?

    Artificial Intelligence isn’t hype—it’s happening. It’s changing how we work, make decisions, and deliver services.

  • Download Zoom

    Download Zoom

    You are heading to a meeting and realize you do not have Zoom downloaded on your computer. What should you do? We…

  • vCIO Success: The Roadmap (Part 5)

    vCIO Success: The Roadmap (Part 5)

    This is the final part of the vCIO series I put together, and arguably, it concludes with one of the most important…

  • vCIO Success: The Relationship (Part 4)

    vCIO Success: The Relationship (Part 4)

    The phrase 'trusted advisor' is used so frequently in our industry that it's become cliché. In reality, only a tiny…

  • vCIO Success: Tracking Technology Assets (Part 3)

    vCIO Success: Tracking Technology Assets (Part 3)

    As the saying goes, you cannot address what you do not know about. This is where an accurate technology asset list…

    2 Comments
  • vCIO Success: Building a budget (Part 2)

    vCIO Success: Building a budget (Part 2)

    A common question I would ask during a sales engagement was: 'Do you meet with your MSP quarterly?' The typical…

  • vCIO Success: The Relationship-First Foundation (Part 1)

    vCIO Success: The Relationship-First Foundation (Part 1)

    After nearly eight years in the MSP industry, progressing through roles from sales to vCIO and then leadership, I…

  • The Evolving Landscape of AI Cyber Threats: A 2025 Forecast

    The Evolving Landscape of AI Cyber Threats: A 2025 Forecast

    The other day, I experienced an AI taking my order at a drive-through. It did a great job, I must admit.

    3 Comments
  • The Danger of Doing Nothing

    The Danger of Doing Nothing

    Frequently within the IT industry, professionals are faced with the task of guiding customers or prospects towards…

    4 Comments

Insights from the community

Others also viewed

Explore topics