Minimize Your Network Attack Surface

Reading Time: 2 minutes During a recent network vulnerability scan at a customer site, I found an IP-based door access control system sitting out on the public internet. Worse yet, the default login credentials for the device had never been changed. Any...