Vulnerabilities / Threats
03:39 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

Eight Of Top Ten Highest Risk Vulnerabilities On SMB Networks Related To Weak Or Blank Passwords

nCircle PureCloud detects weak or blank passwords

SAN FRANCISCO, CA— May 8, 2012— nCircle, the leader in information risk and security performance management, today announced the aggregate results of small business security scans from March 30 – April 28 showed eight of the top ten highest risk vulnerabilities detected on small business networks are connected with blank or default passwords. nCircle PureCloud was designed to simplify network security for small businesses. PureCloud combines nCircle's proven, enterprise-class vulnerability scanning platform with a unique patent-pending scan technology to deliver the most accurate, easy-to-use network security assessment tool available.

Password security policies are a set of rules designed to improve computer security through the use of strong, regularly changing passwords on every account. Since many malware attacks gain access to networks through weak or blank passwords, utilizing good password security policies is a simple, cost effective method any business can use to improve security. For example, Microsoft recently announced that Conficker, a four year old piece of malware that spreads by guessing weak or commonly used passwords, still infected 1.7 million systems in Q4 2011 and was continuing to propagate.

The top scoring password vulnerabilities affecting small business networks include blank or easily guessed credentials for SSH, Telnet, Oracle TNS listener and Windows administrative logins.

“Using default and blank passwords is like leaving the keys in your car and the doors unlocked. Good password security doesn’t cost anything, it just requires consistent effort and it’s one of the most effective things you can do to protect your business from cyber criminals,” stated Andrew Storms, director of security operations for nCircle.

nCircle PureCloud detects weak or blank passwords and is available now. Pricing starts $49 for unlimited scanning of an individual computer for one year, volume discounts apply. You can scan one computer and receive in-depth security reports free through May 31, 2012. Find out more about PureCloud here: or call (415) 625-5930. nCircle is accepting PureCloud partner inquiries.

About nCircle

nCircle is the leading provider of information risk and security performance management solutions to more than 6,500 businesses and government agencies worldwide. nCircle solutions enable enterprises of all sizes to (1) automate compliance and reduce risk, and (2) measure and compare the performance of their IT security program with their own goals and industry peers. nCircle solutions may be deployed on a customer’s premises, as a cloud-based service, or in combination, for maximum flexibility and value.

nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. To learn how you can more effectively protect your company visit us at

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web