Vulnerability Management

The spectacular and headline-grabbing cyber attacks in which thousands of data records are stolen are in no way just the result of a stroke of genius from highly talented hackers. In fact they are increasingly brought about by criminals who have managed to get through without expensive equipment and professional programming knowledge. They use exploits available free of charge online for many thousands of vulnerabilities that are potentially present on every Windows client and server in a company. A successful attack can be led through each of these gaps. Firewalls and virus scanners are easily evaded by these kinds of attacks.