Certified: The CompTIA Security+ Audio Course

Episode 39: Vulnerable Systems, Software, and Devices (Domain 2)


Listen Later

Many attacks succeed not because of advanced hacking techniques, but because of outdated, misconfigured, or unsupported systems that haven’t been properly maintained. This episode addresses the vulnerabilities introduced by aging operating systems, unpatched applications, and insecure endpoints—including laptops, mobile phones, and IoT devices. We also differentiate between client-based and agentless architectures, highlighting how some designs leave assets exposed or unmanaged. Special attention is given to removable devices like USB drives, which introduce risks through malware, unauthorized data transfer, and uncontrolled access points. We explain how vulnerabilities accumulate over time due to delayed patch cycles, dependency sprawl, or lack of visibility in asset inventories. To mitigate these risks, organizations must implement strong patch management, centralized monitoring, and strict hardware control policies. Securing your systems is not just about having the latest tools—it’s about maintaining the health and visibility of everything connected to your environment.

...more
View all episodesView all episodes
Download on the App Store

Certified: The CompTIA Security+ Audio CourseBy Dr. Jason Edwards

  • 5
  • 5
  • 5
  • 5
  • 5

5

3 ratings


More shows like Certified: The CompTIA Security+ Audio Course

View all
CyberWire Daily by N2K Networks

CyberWire Daily

1,018 Listeners

Smashing Security by Graham Cluley

Smashing Security

322 Listeners

Professor Messer's Security+ Study Group by Professor Messer

Professor Messer's Security+ Study Group

139 Listeners

Shawn Ryan Show by Shawn Ryan

Shawn Ryan Show

44,117 Listeners