Cloud Security
Published in

Cloud Security

High-risk ports: The chink in your network armor

A risk-based approach to cybersecurity

Security is principally about managing risk. The more commonly exploited and dangerous ports you have exposed to the Internet, the greater your risk because the attacker will have more chances to try to execute a cyber attack. This observation brings me to the next part of my cybersecurity question related to network exposure: How many systems expose administrative access and high-risk ports to the Internet? This is part of my online book: Cybersecurity for Executives.




Cybersecurity in a Cloudy World

Recommended from Medium

WIP18 Voting Ends, WePiggy’s Deployment Plan on the HECO Mainnet Has Been Approved

Military Romance Scams: Are You a Target?

{UPDATE} Space Decor Hack Free Resources Generator

“Vulnerabilities of the medical sector.” (From our Forums.)

Why is rate-limiting a necessity!

Top 10 Coins by AltRank™ over the last 24 hrs on #LunarCrush!

Single IPsec Tunnel — How to get Higher Bandwidth

{UPDATE} Sacrifices Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Teri Radichel

Teri Radichel

Cloud Security Training and Penetration Testing | GSE, GSEC, GCIH, GCIA, GCPM, GCCC, GREM, GPEN, GXPN | AWS Hero | Infragard | IANS Faculty |

More from Medium

Do you involve the business when doing the analysis on cyber security threats?

What is Business Risk Management? by TechFunnel

CSMA is More Than XDR — Introduction to Cybersecurity Mesh Architecture

How to Measure Threat Detection Quality for an Organization?

Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud