Think Like a Hacker: Common Vulnerabilities Found in Networks

by Sarah Harvey / October 23rd, 2019

What’s the Difference Between Internal and External Networks?

Let’s face it: anything connected to the Internet is at risk of being compromised, which means that organizations like yours must understand the types of vulnerabilities in your internal and external networks that could be exploited by a malicious hacker. If you’re interested in learning about common ways your networks may be compromised by a malicious hacker, remediation tactics for mitigating threats facing your internal and external networks, and how to continue to stay abreast of cyber threats with KirkpatrickPrice’s penetration testing services, watch the full webinar now.

In order to protect your organization’s networks, you must first know the difference between internal and external networks and what systems and devices are connected to them. Are client workstations, internal services (DCs, mail, DB), routers, firewalls, fax machines, and/or printers part of your internal network? Do you have WAFs, web applications, or external services (e.g. FTP, SFTP, or Mail) in your external network environment? Ultimately, internal network environments primarily act as the domain for internal users to access your organization’s internal assets they need to function. External network environments, on the other hand, are more often available to the outside world (e.g. for a partner or client to access).

Common Vulnerabilities in Networks: Configuration Problems

In both internal and external networks, KirkpatrickPrice expert penetration testers often find issues due to misconfigurations. Considering this, they encourage organizations to be weary about leaving default passwords and/or using weak passwords on things like appliances, internal applications, network accounts, or even printers, scanners, and fax machines. To prevent your networks from being compromised due to misconfiguration issues, our pen testers explain that regularly testing your configurations is critical, as well as undergoing at least an annual penetration test.

How sure are you that you have found all of the vulnerabilities in your networks? Could there be more you’re unaware of? Watch the full webinar now to learn about common vulnerabilities in networks or contact us today to speak to one of our Information Security Specialists about our internal and external network penetration testing services.