Episode 37 — Stale Credentials, Rogue Devices, Shadow IT, Wireless, Mobile, and Identity Provider Risks (2.4)
This episode covers attack surface risks created by unmanaged identities, unmanaged assets, and uncontrolled technology use. Stale credentials remain active after users change roles, leave the organization, or stop using a service, creating opportunities for unauthorized access. Rogue devices and shadow IT bypass normal approval, monitoring, patching, and configuration standards. Wireless, low-powered communications, and mobile devices add risk through weak configuration, proximity-based attacks, lost equipment, and inconsistent management. Identity providers are especially important because they can become central points of access for many applications. Security+ scenarios may require access reviews, device inventory, mobile management, network access control, federation hardening, and rapid deprovisioning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!