Vulnerabilities / Threats
03:39 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

Eight Of Top Ten Highest Risk Vulnerabilities On SMB Networks Related To Weak Or Blank Passwords

nCircle PureCloud detects weak or blank passwords

SAN FRANCISCO, CA— May 8, 2012— nCircle, the leader in information risk and security performance management, today announced the aggregate results of small business security scans from March 30 – April 28 showed eight of the top ten highest risk vulnerabilities detected on small business networks are connected with blank or default passwords. nCircle PureCloud was designed to simplify network security for small businesses. PureCloud combines nCircle's proven, enterprise-class vulnerability scanning platform with a unique patent-pending scan technology to deliver the most accurate, easy-to-use network security assessment tool available.

Password security policies are a set of rules designed to improve computer security through the use of strong, regularly changing passwords on every account. Since many malware attacks gain access to networks through weak or blank passwords, utilizing good password security policies is a simple, cost effective method any business can use to improve security. For example, Microsoft recently announced that Conficker, a four year old piece of malware that spreads by guessing weak or commonly used passwords, still infected 1.7 million systems in Q4 2011 and was continuing to propagate.

The top scoring password vulnerabilities affecting small business networks include blank or easily guessed credentials for SSH, Telnet, Oracle TNS listener and Windows administrative logins.

“Using default and blank passwords is like leaving the keys in your car and the doors unlocked. Good password security doesn’t cost anything, it just requires consistent effort and it’s one of the most effective things you can do to protect your business from cyber criminals,” stated Andrew Storms, director of security operations for nCircle.

nCircle PureCloud detects weak or blank passwords and is available now. Pricing starts $49 for unlimited scanning of an individual computer for one year, volume discounts apply. You can scan one computer and receive in-depth security reports free through May 31, 2012. Find out more about PureCloud here: or call (415) 625-5930. nCircle is accepting PureCloud partner inquiries.

About nCircle

nCircle is the leading provider of information risk and security performance management solutions to more than 6,500 businesses and government agencies worldwide. nCircle solutions enable enterprises of all sizes to (1) automate compliance and reduce risk, and (2) measure and compare the performance of their IT security program with their own goals and industry peers. nCircle solutions may be deployed on a customer’s premises, as a cloud-based service, or in combination, for maximum flexibility and value.

nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. To learn how you can more effectively protect your company visit us at

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.