At the heart of every exploit, the vulnerability always lies in the target’s trust for attacker supplied input. This is true whether the attack is network-based or a hacker is trying to gain physical access to a specific location. To effectively mitigate risk, companies and individuals need to take the necessary precautions to keep data secure. The saying in the cybersecurity consulting industry is “trust, but verify.”
Mitigation works on the same principle. Companies and individuals need to verify that the link, person on the other end of the phone or information sent to their servers isn’t going to result in some unexpected error before allowing access. Joseph Hesse, director of the Labs division at Coalfire, offers 10 common ways hackers infiltrate secure systems.