Physical and Logical Security
There were plenty of news in recent years where corporations became victims of data breach. The attacks were completed in various ways, and here are some common examples of vulnerabilities: Software were not patched even after known bugs were discovered. Staff lost a flash drive (aka USB stick) containing sensitive data. Network ports were exposed to non-trusted personnels. Inadequate server room access control. Endpoint security software were not installed. Firewall was not