I. The Vulnerabilities"> II. The Vulnerabilities E-mail attachments E-mail must get through your firewall to be useful, so it is a favorite delivery method among attackers.Outdated software Many software updates patch security problems. The older the hole, the more attackers will know how to exploit it. Persistent connection The longer youre online, the more time attackers have to find and compromise you. Uninformed user One who engages in risky computing behavior, such as using infected disks or not changing default passwords.
Open ports (network or TCP ports) Not securing your ports is like leaving the windows open on your house: Anyone with a ladder can enter.