Top 5 Configuration Mistakes That Create Field Days for Hackers

Having appropriate security configurations requires your applications, servers and databases to be hardened in accordance with best practices.

Link: https://threatpost.com/top-5-configuration-mistakes-hackers/144457/