social engineering techniques
malicious code (malware)
pharming
weak and default passwords
misconfigured access rights
removable media
unpatched and/or outdated software.
The different ways in which networks and devices are protected against unauthorised access.
It is where users are directed to a fake website in order to obtain their login details.
A password that can be easily discovered or detected by other people, such as names of pets or family members, or simple patterns of letters from the keyboard e.g. 123456
A long password (eight characters or longer) that includes a mix of uppercase letters, lowercase letters, numbers and special symbols.