Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Cybersecurity lessons from the red team: How to prevent a data breach

By Madeline Lauver
cyber security lock

Image from Unsplash

August 12, 2022

From weak passwords to human error, many common security vulnerabilities can make an enterprise network susceptible to a cyberattack — and hackers are aware of them all.

In a session at the Impact Optimize conference on August 11, 2022, cybersecurity experts and red team members shared their advice for enterprise organizations seeking to prevent data breaches. Jeremy Haberkorn, Senior Cybersecurity Engineer at DOT Security; Nathan Golick, Senior Penetration Tester at DOT Security; and Wes Spencer, Vice President, Channel Chief at FifthWall Solutions and former chief information security officer (CISO) shared their insights gained from years in cybersecurity and penetration testing.

Common enterprise cybersecurity vulnerabilities

While searching for cyber exploits to gain access to enterprise networks, hackers typically look for simple ways to breach a network, according to Haberkorn. Hosting devices with default security configurations on an enterprise network is one common vulnerability the penetration testers saw frequently.

By leaving default security configurations enabled on networked devices, organizations leave themselves open to higher levels of cyber risk. Default settings and passwords is oftentimes publicly accessible on the internet. "We're able to go in there and just do a Google search and find out what the what the password is," said Haberkorn. Once login information is attained by an external actor, enterprise organizations are vulnerable to a data breach. 

Weak passwords are also a significant source of data breaches. From commonly guessed credentials ("password," "qwerty" and those containing company information, to name a few) to repeating passwords, users open their organizations up to risk by neglecting to adhere to password best practices.

Once a repeated password is obtained by bad actors, they can use it to gain further access to a network, creating a single point of failure for a widespread breach. "With single point of failure, that can be something that [penetration testers] really want to [identify] and find those as many places as possible in the environment," said Golick. By only using passwords once, users can reduce their enterprise's level of cyber risk.

Social engineering also presents a high level of risk to businesses, with external actors targeting an organization's employees to circumvent security controls in place. "Hackers are not going to necessarily go against firewalls or security solutions," said Haberkorn, "they're going to target everyone through their email. They're going to try to find people who... can be manipulated."

Email phishing is one example of social engineering — some actors will target specific individuals with social engineering attacks, learning the interests of their target to make their phishing email more urgent or important to the recipient.

Data breach prevention tips

Knowing common cybersecurity vulnerabilities in an organization is the first step to protecting the enterprise from cyberattacks. Haberkorn, Golick and Spencer shared best practices for reducing cyber risk in an organization, including:

  • Change default security settings and credentials
  • Build a security culture across the business with cybersecurity training
  • Incorporate tools and processes for employee incident reporting

By following these steps, businesses can reduce their cyberattack surface and prevent largescale data breaches before they occur.

KEYWORDS: cyber attack cyber security education data breach penetration testing phishing red teaming social engineering

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Looking for Clues

    Suite success: Three steps executive teams should take to prevent and survive a data breach

    See More
  • SEC0820-Data-Feat-slide1_900px.jpg

    Lessons learned from the Equifax data breach

    See More
  • Crumpled paper and paper airplane

    Navigating Data Security in Financial Services: Lessons from the TeleMessage Breach

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing