<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/protection/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #Protection</title><description>GTconsult - Blog #Protection</description><link>https://www.gtconsult.com/blogs/tag/protection</link><lastBuildDate>Thu, 23 Apr 2026 08:37:45 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Your SharePoint Could Be an Open Door. Here's What Every Business Leader Needs to Know.]]></title><link>https://www.gtconsult.com/blogs/post/your-sharepoint-could-be-an-open-door.-here-s-what-every-business-leader-needs-to-know.</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/CVE thumbnail.png"/>SharePoint On-Premises has been under active attack since July 2025. Multiple critical vulnerabilities. A patch deadline approaching in 83 days. Here is what every business leader needs to know right now.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_xSxL1OCpQB-o6_lOHACRyg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lvTJY2NlSYKRuLUv-c-qiw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_REcAT4n3TgCGGFQZTtYOKw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qAs52JE8TnKJM7gqHtW38Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>If your organisation runs SharePoint On-Premises, this is not a drill.</span></p><p><span><br/></span></p><p><span></span></p><p style="margin-bottom:8pt;">Over the past several months, a series of critical vulnerabilities have been discovered and actively exploited in on-premises Microsoft SharePoint environments. These are not theoretical risks sitting in a security researcher's lab. They are real attacks against real organisations, happening right now.</p><p style="margin-bottom:8pt;"><br/></p><p style="margin-bottom:8pt;">And if you haven't acted yet, you may already be exposed.</p><p></p></div>
</div><div data-element-id="elm_qNw11k9MK17HsN5jHp_VrQ" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> @media (max-width: 767px) { [data-element-id="elm_qNw11k9MK17HsN5jHp_VrQ"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_qNw11k9MK17HsN5jHp_VrQ"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="315" src="https://www.youtube.com/embed/q2uThhTkZv4?si=gd01pzu9ug07GwZ2" frameborder="0" allowfullscreen></iframe></div>
</div></div></div></div></div><div data-element-id="elm_3xdX2APRKybdZG6ugqnhew" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1h-AaPr4bLSDM7etVvHFNw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_DYlxv0yPX9jP8I2T1cJJcg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_3wW0YCRbY2uopejomQDnMw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);"><span style="font-size:24px;">What's actually happening?</span></strong></h2></div>
<div data-element-id="elm_4WGbpj-slkhNNRwnr4RPtQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">In July 2025, Microsoft disclosed a critical vulnerability known as ToolShell (CVE-2025-53770), rated 9.8 out of 10 on the severity scale (where 10 is the most dangerous possible). This vulnerability affected all supported versions of SharePoint On-Premises: SharePoint Server 2016, 2019, and Subscription Edition.</p><p style="margin-bottom:8pt;">What made this particularly alarming was that attackers didn't need a password or any prior access to your system. If they could reach your SharePoint server, they could get in.</p><p style="margin-bottom:8pt;">Before Microsoft could fully patch the issue, more than 400 organisations globally had already been compromised, including US government agencies. Chinese state-sponsored threat actors were among those identified, alongside ransomware groups who exploited the same vulnerability for financial gain.</p><p style="margin-bottom:8pt;">That was 2025. In 2026, the attacks have continued.</p></div><p></p></div>
</div><div data-element-id="elm_-tjbo6fAdyzaw3zrzSebFQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_-tjbo6fAdyzaw3zrzSebFQ"] .zpimagetext-container figure img { width: 481.9px !important ; height: 271px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/cybercriminal-using-ai-machine-learning-to-develop-2026-03-19-02-08-53-utc.jpg" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">In January 2026, Microsoft disclosed a new critical SharePoint vulnerability (CVE-2026-20963, also rated 9.8) affecting all supported on-premises versions. By March 2026, CISA (the US Cybersecurity and Infrastructure Security Agency) added it to their Known Exploited Vulnerabilities catalogue, confirming it was being actively used in attacks. Federal agencies were ordered to patch immediately.</p><p style="margin-bottom:8pt;">Then, just this month in April 2026, Microsoft's Patch Tuesday (the largest in Microsoft's history by CVE count) included yet another actively exploited SharePoint zero-day: CVE-2026-32201. This is a spoofing vulnerability that allows an unauthenticated attacker to inject malicious scripts into SharePoint pages, potentially stealing session tokens, redirecting users to malicious content, or enabling broader phishing and ransomware campaigns. It was being exploited in the wild before today's patch was available.</p><p style="margin-bottom:8pt;">And there is one more date that SharePoint Server 2016 and 2019 customers need to know: 14 July 2026. That is when both versions reach end of support. After that date, Microsoft will no longer release security patches for SharePoint Server 2016 or 2019, meaning any vulnerability discovered after July 2026 will remain permanently unpatched on those versions. SharePoint Server Subscription Edition is not affected by this deadline and remains supported under Microsoft's Modern Lifecycle Policy with no fixed end date.</p></div><p></p></div>
</div></div><div data-element-id="elm_pVVSsTsV-qsi4hT1BeRTGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pVVSsTsV-qsi4hT1BeRTGg"].zpelem-text { background-color:#001B4C; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border-width:medium;border-style:none;padding:0px;"><p></p><div><pre style="margin-bottom:28px;"><br/><span style="color:rgb(166, 206, 57);"><span>In less than 12 months, SharePoint On-Premises has been the subject of multiple critical, actively exploited vulnerabilities. <br/>This is not a one-off event. It is a pattern. And for SharePoint Server 2016 and 2019 customers specifically, the safety net <br/>of Microsoft security patches disappears entirely in 90 days.</span><br/></span></pre></div><p></p></blockquote></div>
</div><div data-element-id="elm_V8uaWuQAqbk-pMKSidcvEQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);"><span style="font-size:24px;"><span>Why should a business leader care?</span></span></strong></h2></div>
<div data-element-id="elm_kysX3KtF6qo4jtjRZm2KXw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">SharePoint is not just a file storage system. For many organisations, it is the central nervous system of the business, holding sensitive documents, running workflows, storing employee data, and connecting to other Microsoft services like Teams, Outlook, and OneDrive.</p></div><p></p></div>
</div><div data-element-id="elm__t6vAPzzPlhGDmnDgrhgUQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">When an attacker gets into SharePoint, they don't just see your files. They can:</p></div><p></p></div>
</div><div data-element-id="elm_e1JZkGenFpWoXZwtjfrO3Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:5pt;margin-left:36pt;">•<span>&nbsp; </span>Move laterally across your entire Microsoft environment</p><p style="margin-bottom:5pt;margin-left:36pt;">•<span>&nbsp; </span>Access sensitive business and personal data</p><p style="margin-bottom:5pt;margin-left:36pt;">•<span>&nbsp; </span>Install backdoors that persist even after patches are applied</p><p style="margin-bottom:5pt;margin-left:36pt;">•<span>&nbsp; </span>Deploy ransomware across your network</p><p style="margin-bottom:5pt;margin-left:36pt;">•<span>&nbsp; </span>Steal credentials and impersonate trusted users</p></div><p></p></div>
</div><div data-element-id="elm_C7dIolRxMTehnBd7-XR6FA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">And here is the part that should concern every business leader most: you may not know it has happened. These attacks are designed to be quiet. By the time you notice something is wrong, the attacker may have been inside your systems for weeks or months.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_9PxxXHNnuhwB_nQssOEGSg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_D2Eq4IFW2ngG20PkFWH-1g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gXlRZ8ew2dK1Y64DMnDVEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_rjMKp4B0n3CAccf3GSj6jg" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 576 512" height="576" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M280.37 148.26L96 300.11V464a16 16 0 0 0 16 16l112.06-.29a16 16 0 0 0 15.92-16V368a16 16 0 0 1 16-16h64a16 16 0 0 1 16 16v95.64a16 16 0 0 0 16 16.05L464 480a16 16 0 0 0 16-16V300L295.67 148.26a12.19 12.19 0 0 0-15.3 0zM571.6 251.47L488 182.56V44.05a12 12 0 0 0-12-12h-56a12 12 0 0 0-12 12v72.61L318.47 43a48 48 0 0 0-61 0L4.34 251.47a12 12 0 0 0-1.6 16.9l25.5 31A12 12 0 0 0 45.15 301l235.22-193.74a12.19 12.19 0 0 1 15.3 0L530.9 301a12 12 0 0 0 16.9-1.6l25.5-31a12 12 0 0 0-1.7-16.93z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:14px;"><span style="font-weight:bold;">Do you run SharePoint On-Premises&nbsp;</span><strong>(not SharePoint Online)</strong><span style="font-weight:bold;"><strong>?</strong></span></span><span></span></h3><div class="zpicon-text-container " data-editor="true"><p><span>If yes, read on.</span></p></div>
</div></div></div><div data-element-id="elm_EqGu-1m-g-HPaoCC7JZbDg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NKV6vGLxnAcd56rSUcao9A" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:14px;"><b>When last did your IT team apply Microsoft security patches</b></span></h3><div class="zpicon-text-container " data-editor="true"><p></p><div><p style="margin-bottom:5pt;margin-left:36pt;"><span>to your SharePoint servers?</span></p></div>
<p></p></div></div></div></div><div data-element-id="elm_sFmqdjkps2JJ-nJ-uEkhlA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_GRmKkNLHfGzAT90NDIjnOw" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M480 160H32c-17.673 0-32-14.327-32-32V64c0-17.673 14.327-32 32-32h448c17.673 0 32 14.327 32 32v64c0 17.673-14.327 32-32 32zm-48-88c-13.255 0-24 10.745-24 24s10.745 24 24 24 24-10.745 24-24-10.745-24-24-24zm-64 0c-13.255 0-24 10.745-24 24s10.745 24 24 24 24-10.745 24-24-10.745-24-24-24zm112 248H32c-17.673 0-32-14.327-32-32v-64c0-17.673 14.327-32 32-32h448c17.673 0 32 14.327 32 32v64c0 17.673-14.327 32-32 32zm-48-88c-13.255 0-24 10.745-24 24s10.745 24 24 24 24-10.745 24-24-10.745-24-24-24zm-64 0c-13.255 0-24 10.745-24 24s10.745 24 24 24 24-10.745 24-24-10.745-24-24-24zm112 248H32c-17.673 0-32-14.327-32-32v-64c0-17.673 14.327-32 32-32h448c17.673 0 32 14.327 32 32v64c0 17.673-14.327 32-32 32zm-48-88c-13.255 0-24 10.745-24 24s10.745 24 24 24 24-10.745 24-24-10.745-24-24-24zm-64 0c-13.255 0-24 10.745-24 24s10.745 24 24 24 24-10.745 24-24-10.745-24-24-24z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:14px;"><b>Is your SharePoint accessible from outside your office network</b></span></h3><div class="zpicon-text-container " data-editor="true"><p><span>(via VPN or directly)?</span></p></div>
</div></div></div></div></div></div><div data-element-id="elm_t2Rqxi-pfb9DWll1ZyGpyw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b-Lwv88h6QUi2F7zpg7Ljw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_ItxD1TjeF4UnAZHNQAUz1g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_mZS65SC0jk5rfsrfVbTfJw" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:14px;"><b>Do you have monitoring in place</b></span><br/><span style="font-size:14px;">​</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>to detect unusual activity on your SharePoint environment?</span></p></div>
</div></div></div><div data-element-id="elm_DAn60WCFShuHyifXO3mAhg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_fAwKXy3DRcj-GTQx9J8dPQ" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 384 512" height="384" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M336 64h-80c0-35.3-28.7-64-64-64s-64 28.7-64 64H48C21.5 64 0 85.5 0 112v352c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V112c0-26.5-21.5-48-48-48zM192 40c13.3 0 24 10.7 24 24s-10.7 24-24 24-24-10.7-24-24 10.7-24 24-24zm144 418c0 3.3-2.7 6-6 6H54c-3.3 0-6-2.7-6-6V118c0-3.3 2.7-6 6-6h42v36c0 6.6 5.4 12 12 12h168c6.6 0 12-5.4 12-12v-36h42c3.3 0 6 2.7 6 6z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:14px;"><b>Has your team assessed whether you may have been compromised</b></span></h3><div class="zpicon-text-container " data-editor="true"><p><span><span>during the 2025 or early 2026 attack waves?</span></span></p></div>
</div></div></div></div><div data-element-id="elm_2-cKzdN0dlqiYzoeJb-Z4Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_ysy6XtDtFGRPnVa1LFnCUA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_HficLhP8lwsw47CTz8VKTA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">If you answered yes to the first question and no to any of the others, your organisation is carrying unnecessary risk.</p></div><p></p></div>
</div><div data-element-id="elm_xK-Cw2M34IoOZHoegZ7clw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_xK-Cw2M34IoOZHoegZ7clw"].zpelem-text { background-color:#001B4C; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border-width:medium;border-style:none;padding:0px;"><p></p><div><pre style="margin-bottom:28px;"><br/><span style="color:rgb(166, 206, 57);"><span><span>Important note: If you run SharePoint Online (part of Microsoft 365), you are not affected. Microsoft patches cloud <br/>environments automatically. This risk applies specifically to organizations hosting their own SharePoint servers.</span></span><br/></span></pre></div><p></p></blockquote></div>
</div><div data-element-id="elm_fORsdSuON-YLp1_bK1Q72w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);"><span style="font-size:24px;"><span>Why should a business leader care?</span></span></strong></h2></div>
<div data-element-id="elm_2z0ywloizUREnawrb3rtXQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">This is not a moment for a committee to review and report back in 30 days. The following actions need to be on your IT team's desk this week:</p></div><p></p></div>
</div><div data-element-id="elm_OOcmkwCL3q6ly6GXwoQBLg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_OOcmkwCL3q6ly6GXwoQBLg"] .zpimagetext-container figure img { width: 458px !important ; height: 395px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Dog%20Math%20GIF.gif" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><h3>1. Patch immediately</h3><p style="margin-bottom:8pt;">Microsoft has released security updates for all supported SharePoint On-Premises versions. Your IT team needs to apply the latest cumulative security patches. For the Subscription Edition, this means applying January, February, and March 2026 updates in sequence, as well as the April 2026 Patch Tuesday updates released this week.</p><h3>2. Rotate your cryptographic keys</h3><p style="margin-bottom:8pt;">Patching alone is not enough. Microsoft explicitly advises that organisations rotate their SharePoint server ASP.NET machine keys and restart IIS on all SharePoint servers after patching. This closes a backdoor that attackers may have established even before you patched.</p><h3>3. Assume you may already be compromised</h3><p style="margin-bottom:8pt;">If your SharePoint was accessible from the internet at any point between July 2025 and now and you have not already conducted a compromise assessment, security experts strongly recommend you assume a breach has occurred and investigate accordingly. Patching closes the door, but it does not evict anyone already inside.</p><h3>4. Enable monitoring</h3><p style="margin-bottom:8pt;">Set up alerts for unusual activity: failed login spikes, unusual outbound traffic, PowerShell executions on SharePoint servers, and large unexpected data downloads. These are the warning signs of an active attack or a persistent threat already inside your environment.</p><h3>5. Plan for the future</h3><p style="margin-bottom:8pt;">This is not the last SharePoint vulnerability we will see. Organisations that run on-premises SharePoint need a structured, recurring patch management process, not a reactive scramble every time a critical CVE makes the news.</p></div><p></p></div>
</div></div><div data-element-id="elm_3YqvdCN4qlXmto-1DHvhkA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);"><span style="font-size:24px;"><span><span>The hard question: is On-Premises still the right choice?</span></span></span></strong></h2></div>
<div data-element-id="elm_ilHM-DRDf9lvtWsOrgd8OA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">We are not here to tell every organisation to move to the cloud. There are legitimate reasons (regulatory requirements, data sovereignty, legacy integrations) why some organisations must keep SharePoint On-Premises.</p><p style="margin-bottom:8pt;">But the security overhead is real and growing. Every critical vulnerability that Microsoft patches in the cloud automatically means nothing to an on-premises customer who hasn't applied the update. The responsibility sits squarely with your IT team, and the window between disclosure and exploitation is shrinking.</p><p style="margin-bottom:8pt;">And then there is the end-of-life reality. SharePoint Server 2016 and SharePoint Server 2019 both reach end of support on 14 July 2026, just 90 days from now. After that date, Microsoft will release no further security patches for either version. Any vulnerability discovered after July 2026 will remain permanently unpatched on those platforms. If you are running SharePoint Server Subscription Edition, you are not affected by this deadline — it remains supported with no fixed end date. But if you are on 2016 or 2019, the options are clear: migrate to SharePoint Online, upgrade to SharePoint Server Subscription Edition, or accept an ever-growing security exposure with no vendor safety net.</p><p style="margin-bottom:8pt;">If you are running On-Premises purely out of habit, inertia, or because it has always been that way: the clock is no longer just ticking. It has nearly run out.</p></div><p></p></div>
</div><div data-element-id="elm_lCN59IyvL1Ykg_F7zfSLgg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_lCN59IyvL1Ykg_F7zfSLgg"] .zpimageheadingtext-container figure img { width: 118px !important ; height: 128.96px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/GT_icon_gr-1.png" data-src="/Blog%20Site/GT_icon_gr-1.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><strong style="color:rgb(0, 27, 76);">Where GTconsult can help</strong></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:8pt;">We work with organisations on exactly these challenges. Whether you need help patching and hardening your current SharePoint environment, assessing whether you have already been compromised, setting up monitoring and alerting, evaluating a migration to SharePoint Online, or conducting penetration testing and vulnerability assessments: we have the expertise to help.</p></div><p></p></div>
</div></div></div><div data-element-id="elm_uzRphCVvWGxFk1pzPKJyCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_NcWmy8sBnciHMCN-h1Sb7w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ko7Mf90NMHXJTWUlKVMdXQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdark-section zpdark-section-bg "><style type="text/css"> [data-element-id="elm_ko7Mf90NMHXJTWUlKVMdXQ"].zpelem-box{ background-color:#001B4C; background-image:unset; } </style><div data-element-id="elm_6kLuOR6tkRjs1vkmj8fUgg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Not sure where to start?</strong><br/></h3></div>
<div data-element-id="elm__slrVE2JOkkbJA8NjiJ8-g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div style="text-align:center;margin-bottom:8px;"><div><p style="margin-bottom:28px;font-style:italic;"><span style="font-size:16px;">Chat to us and let's help you navigate this change.</span></p><span style="font-weight:700;"><a href="https://www.gtconsult.com/contact"></a></span></div></div><p></p></div>
</div><div data-element-id="elm_8PxlmgaRlNttSaX-sTI2HA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8PxlmgaRlNttSaX-sTI2HA"].zpelem-button{ margin-block-start:-5px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://outlook.office.com/bookwithme/user/6bd34779624c4a8ab5f3906f5e71baf7%40gtconsult.com/meetingtype/Cfseq1rTWEyZRk62iTNVAw2?anonymous&amp;ismsaljsauthenabled=true"><span class="zpbutton-content">Book a Free Consultation with Our Technical Account Manager, Trevin</span></a></div>
</div><div data-element-id="elm_TAuhsbZ6v_i4d7VgiqruIw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_TAuhsbZ6v_i4d7VgiqruIw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_TAuhsbZ6v_i4d7VgiqruIw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 23 Apr 2026 11:47:43 +0000</pubDate></item><item><title><![CDATA[If You Haven't Tested Your Security, You Don't Actually Know If It Works]]></title><link>https://www.gtconsult.com/blogs/post/if-you-haven-t-tested-your-security-you-don-t-actually-know-if-it-works</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Pen Test Thumbnail.png"/>Most businesses have security in place. But when last did anyone test if it actually works? Discover why penetration testing is the difference between assuming you're secure and knowing you are.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_3D0Tmzb5T9Wa9Wqw-ExulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Hq-NabZSRhOrQ2_D4C9aCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_FF1Im4yzRrqxJKBfEV4UTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4nOShi1pN_RP5cweEmltTQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_4nOShi1pN_RP5cweEmltTQ"] .zpimage-container figure img { width: 286px !important ; height: 195px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Fire%20Elmo%20GIF.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_5s78W04vb82nVS26UAaSng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NuKHHutt3HtylAu63MvR5w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:left;">Most businesses have some form of security in place. Firewalls. Antivirus. Maybe an MFA policy that someone set up a while back. And on paper, that feels like enough.</p><p style="text-align:left;">But here's the uncomfortable question: when last did anyone actually test whether it holds up?</p><p style="text-align:left;">Not a checklist. Not a vendor assurance. An actual, deliberate attempt to break through it, the way an attacker would.</p><p style="text-align:left;">Because there's a significant difference between having security and having security that works.</p></div>
<p></p></div></div></div></div></div></div><div data-element-id="elm_AfqoiiGUNXZCXhMeWvk6Ww" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_KoWbxoLmdRNRRxWxZeO8hQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_F7yw0W46bZO-2qm96S1qgQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_1fsOWuhQaHy-z_LFJQCvNQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The gap most businesses don't see<br/></span></h2></div>
<div data-element-id="elm_jErWC9BF9UXo1DPM1hfYvA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div> Cyber threats aren't theoretical anymore. South Africa is consistently ranked among the most targeted countries on the continent for cyber attacks (and attackers aren't just going after the big corporates). SMEs are increasingly in the crosshairs precisely because they tend to have fewer defences. </div>
<br/><div> What makes this particularly tricky is that most vulnerabilities aren't obvious. They don't announce themselves. They sit quietly in your environment, in a misconfigured permission, an unpatched API, a login page that accepts inputs it shouldn't — waiting for someone who knows what to look for. </div>
<br/><div> And the reality is, the people building and maintaining your systems are focused on making things work. That's the job. Security is a different discipline entirely, and it requires a very different mindset — one that's actively looking for what can go wrong, not just what works. </div>
</div><p></p></div></div><div data-element-id="elm_h7_XPmOop1dAnXlul-p2PA" data-element-type="dividerText" class="zpelement zpelem-dividertext "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-text zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid zpdivider-style-none "><div class="zpdivider-common">Most breaches don't happen because nobody checked whether the security they had was actually doing its job. businesses had no security. They happen because </div>
</div></div></div></div></div></div><div data-element-id="elm_9ItA4MuDtGsrecanMRMtZg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_qZUTDjG0DVI66Qli3NM6Nw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_AvVsSZFwptov-BJ1y_q4ew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_qcuU8YSR2T9ehNBL1Ztgkg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>What a penetration test actually does<br/></span></h2></div>
<div data-element-id="elm_5Lod1Tr1_OzgFZsdGH1wdQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_5Lod1Tr1_OzgFZsdGH1wdQ"] .zpimagetext-container figure img { width: 450px !important ; height: 302px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Magnify%20Rick%20Moranis%20GIF.gif" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><p>A penetration test (done properly) is a controlled, authorised attempt to compromise your systems before a real attacker does.</p><p><br/></p><p>It's not a automated scan. It's not a report that lists every CVE in your environment and calls it a day. It's someone thinking the way an attacker thinks, probing for the paths that matter, and documenting exactly what they found, how they found it, and what the business impact actually is.</p><p><br/></p><p>The output isn't just a list of vulnerabilities. It's clarity. You walk away knowing:</p></div>
<p></p><p><span><span><br/></span></span></p><p><span><span>Where your real exposure is, not just theoretical risk</span><br/><span>What an attacker could realistically access or do</span><br/><span>Which fixes will have the biggest impact on actual security</span><br/><span>Whether your existing controls are doing what you think they're doing</span></span></p></div>
</div></div><div data-element-id="elm_V0gXKYsV4CDyOop0nwSGbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>That last one matters more than people realise. It's not uncommon to find a control that's been in place for years, that everyone assumes is working, that a pen tester can walk straight through in under an hour.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_EkVESAhlM7hptd0LjZy0ZQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Y7eeXaCjbn309i9SshO5AQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_3aAiKlF3XKm_r2TCYY90lA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9LJtaSe5ncL1CnUqKyPn5Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The business case for testing before something goes wrong<br/></span></h2></div>
<div data-element-id="elm_J_QzvuUZxhsrM3dRBmNjGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>There's a version of this conversation that happens after an incident. After a breach. After data has been exfiltrated, or systems have been locked down by ransomware, or a client calls asking why their data appeared somewhere it shouldn't.</p><p><br/></p><p>That conversation is expensive. Remediation is expensive. Reputational damage is expensive. Regulatory exposure (especially under POPIA) can be very expensive.</p><p><br/></p><p>A penetration test, run proactively, finds the same problems before they become incidents. It's the difference between fixing a lock and explaining to your clients why their data is gone.</p><p><br/></p><p>We've seen it go both ways. Businesses that test regularly catch things early and fix them quietly. Businesses that don't, often find out the hard way — and at the worst possible time.</p></div>
<p></p></div></div><div data-element-id="elm_jPwF5Oy4cAu65U_gYI7cVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(166, 206, 57);"><a href="https://www.gtconsult.com/blogs/post/case-study-how-proactive-security-testing-unlocked-enterprise-growth-for-lelapa-ai" title="Read about what happens when you are proactive." target="_blank" rel="">Read about what happens when you are proactive.</a></span></p></div>
</div></div></div></div></div><div data-element-id="elm_cfdasUg-yfPur6Usg6kIKQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z6Y28T16096t2ZlNhMEIUA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_NsvBFQoB3Pbe3_cH3Z-r0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_yb0lhy9smTvoEKOr0xGMNw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>How often should you be testing?<br/></span></h2></div>
<div data-element-id="elm_HxsrwalybHO6W4vd5p8NAA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_HxsrwalybHO6W4vd5p8NAA"] .zpimagetext-container figure img { width: 301px !important ; height: 301px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Join%20Us%20Save%20The%20Date%20GIF%20by%20Similarweb.gif" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><div> There's no universal answer, but a good rule of thumb: any time something significant changes in your environment, test it. New application deployed. Major infrastructure change. New cloud integration. After a security incident, even a minor one. </div>
<br/><div> Beyond that, most organisations benefit from at least an annual assessment, more frequently if you're in a regulated industry or handle sensitive data at scale. </div>
<br/><div> The point isn't to test for the sake of testing. It's to make sure that as your environment evolves, your security posture evolves with it. Because attackers aren't standing still, and neither are the techniques they use. </div>
</div><p></p></div></div></div><div data-element-id="elm_Fq2n_fgWRSt2fRcG82_noQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_JeFfODD4vsNC4LokXGrKpA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Find out where your exposure actually is, before someone else does.</span></h2></div>
<div data-element-id="elm_zPLWMAlUv9dLrtDyENZYbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>GT Consults offers penetration testing for web applications, internal networks, APIs, and cloud environments. We give you a clear picture of your real risk — and exactly what to do about it.</span></span></p></div>
</div><div data-element-id="elm_7hKyq0OpbSvPI5GQz5_jag" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://outlook.office.com/bookwithme/user/6bd34779624c4a8ab5f3906f5e71baf7%40gtconsult.com/meetingtype/Cfseq1rTWEyZRk62iTNVAw2?anonymous&amp;ismsaljsauthenabled=true" target="_blank" title="Book time with our technical account manager "><span class="zpbutton-content">Book a Pen Test Consultation</span></a></div>
</div><div data-element-id="elm_EIWpnOWwc9EKOIAftLg_fg" data-element-type="iframe" class="zpelement zpelem-iframe "><style type="text/css"></style><div class="zpiframe-container zpiframe-align-center"><iframe class="zpiframe " src="https://www.youtube.com/embed/e4YSke1x13o?si=FoKco4ey1ySSdg4R" width="560" height="315" align="center" allowfullscreen frameBorder="0" title="YouTube video player"></iframe></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Mar 2026 10:52:00 +0000</pubDate></item><item><title><![CDATA[The Secure Score Improvement Trap (And How to Avoid It) ]]></title><link>https://www.gtconsult.com/blogs/post/the-secure-score-improvement-trap-and-how-to-avoid-it</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Migration Write Up Thumbnailnn.png"/>Most IT teams chase high-point Secure Score recommendations without strategy, leading to wasted effort and declining scores. Learn why "quick wins" fail, how to prioritize based on actual risk instead of points, and build sustainable improvements that stick—avoiding the trap of configuration drift.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_lz8Hp0r7T4iY_KuEprkRbA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_d6ewc2XhTWSEUvHwuZMdmg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eef7-YFFRwin8RIYgYq_9g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_W-r_AudYSpymkQrZnktlvg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>You know your Secure Score should be higher. You've read about configuration drift eating away at your security posture. You understand that lack of capacity is keeping your score stuck.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_ppkc3NN1ZRTFkPrvMWv0pw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QumHFkR0fQuil2FLFB1FQA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_d5WXSPOTQFUGgIJk37JPOA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0PTU7PUibdWrrrQeX22Btw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0PTU7PUibdWrrrQeX22Btw"] .zpimage-container figure img { width: 480px !important ; height: 270px !important ; } } @media (max-width: 767px) { [data-element-id="elm_0PTU7PUibdWrrrQeX22Btw"] .zpimage-container figure img { width:415px ; height:233.44px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Jake%20Johnson%20Fox%20GIF%20by%20New%20Girl.gif" width="415" height="233.44" loading="lazy" size="original"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QWb3cenqyl5-nbDk2doPNQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_h8NZW41xNAEasNzUhJJzAw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;">This is the trap most IT teams fall into: they start implementing recommendations in order of points or ease, without understanding which changes actually matter for their specific risk profile—or how to sustain improvements once they're made.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">The result? Wasted effort on low-impact changes, broken workflows from poorly planned implementations, and scores that plateau or even decline despite your best efforts.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_-lqIVfgztTQU5wIGuT2eew" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hlzZcYoctvtUfTpjpjCPCw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_jadNP54gSUv3A256sTV4dg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Kqw6IKmkLkONvR4BxZjlzA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Why Most Secure Score Improvement Efforts Fail</strong><br/></h3></div>
<div data-element-id="elm_K5dtUjhEOB7OFIyrrrywUQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>The typical approach looks something like this: open the Microsoft Defender portal, see a list of recommendations, pick the ones worth the most points or that seem easiest, and start implementing.</p><p><br/></p><p>Three months later, your score has barely moved. Or it moved briefly and then dropped back down. Or you've spent weeks on improvements that broke critical workflows and had to be rolled back.</p><p><br/></p><p>The problem isn't lack of effort. It's lack of strategy.</p><p><br/></p><p>Effective Secure Score improvement requires understanding three things most teams skip:</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_eCvXmaRpgT-m5i0Y9HwBPA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_RX65JGdOO-3BVg2fhPf-Dw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_GgK_S1zjTP5rQpRfafDosw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_45NRgDyRD6VlmI_CZEl6dA" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-left zpicon-align-mobile-left zpicon-align-tablet-left zpicon-clear-align"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 576 512" height="576" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M569.517 440.013C587.975 472.007 564.806 512 527.94 512H48.054c-36.937 0-59.999-40.055-41.577-71.987L246.423 23.985c18.467-32.009 64.72-31.951 83.154 0l239.94 416.028zM288 354c-25.405 0-46 20.595-46 46s20.595 46 46 46 46-20.595 46-46-20.595-46-46-46zm-43.673-165.346l7.418 136c.347 6.364 5.609 11.346 11.982 11.346h48.546c6.373 0 11.635-4.982 11.982-11.346l7.418-136c.375-6.874-5.098-12.654-11.982-12.654h-63.383c-6.884 0-12.356 5.78-11.981 12.654z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:16px;color:rgb(0, 27, 76);"><strong>Which improvements actually address your organization's risk profile</strong></span></h3><div class="zpicon-text-container " data-editor="true"><p><span>A 10-point recommendation that protects against threats you don't face is wasted effort. Meanwhile, a 3-point recommendation that closes a critical gap specific to your industry might be essential. Points don't equal priority.</span></p></div>
</div></div></div><div data-element-id="elm_ABAeeLAhkLcVYDfTu6Ggug" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Kr6YXbmtaXgEstRtbQ7d1A" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-left zpicon-align-mobile-left zpicon-align-tablet-left zpicon-clear-align"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M328 256c0 39.8-32.2 72-72 72s-72-32.2-72-72 32.2-72 72-72 72 32.2 72 72zm104-72c-39.8 0-72 32.2-72 72s32.2 72 72 72 72-32.2 72-72-32.2-72-72-72zm-352 0c-39.8 0-72 32.2-72 72s32.2 72 72 72 72-32.2 72-72-32.2-72-72-72z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:16px;color:rgb(0, 27, 76);"><strong>The sequence and dependencies between changes</strong></span></h3><div class="zpicon-text-container " data-editor="true"><p><span>Some security improvements need to happen in specific order. Others interact in ways that can break functionality if you don't understand the technical relationships. Implementing changes in the wrong sequence wastes time on rework and troubleshooting.</span></p></div>
</div></div></div><div data-element-id="elm_wzVFO7TTepfN6XCBHDbsWw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_k1Wnqrly5y8yxlJbjaV7VQ" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-left zpicon-align-mobile-left zpicon-align-tablet-left zpicon-clear-align"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 24 24" height="24" width="24" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M9 1H1V9H9V6H11V20H15V23H23V15H15V18H13V6H15V9H23V1H15V4H9V1ZM21 3H17V7H21V3ZM17 17H21V21H17V17Z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><strong><span style="font-size:16px;color:rgb(0, 27, 76);">How to build monitoring and maintenance into your workflows</span></strong></h3><div class="zpicon-text-container " data-editor="true"><p><span>Configuration drift is inevitable. The question isn't whether your settings will drift from their intended state—it's whether you'll catch it when they do. Without systematic monitoring, improvements degrade over time and your score reflects it.</span></p></div>
</div></div></div></div></div></div><div data-element-id="elm_Zc84FhGQRThGBq1pbzG67A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_GORQ97KrQzti3iw8X4_-Dw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_K6ckYCgW8eRENDsDosLFZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_lCmg9_F1Gy9YDlDASNvyrw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Hidden Complexity of &quot;Simple&quot; Recommendations</strong></h3></div>
</div></div></div></div><div data-element-id="elm_ECTNIhMa5k5_7-MOY6fvrg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Ea3KzZiGkfLibwRKRqTrQA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HEuPMYwwn4iG1saxgikqCg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pltIx35EwKx4rlb1k0SIwg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pltIx35EwKx4rlb1k0SIwg"] .zpimage-container figure img { width: 400px !important ; height: 300px !important ; } } @media (max-width: 767px) { [data-element-id="elm_pltIx35EwKx4rlb1k0SIwg"] .zpimage-container figure img { width:415px ; height:233.44px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/avril%20lavigne%20GIF.gif" width="415" height="233.44" loading="lazy" size="original"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QjlEiDfN90750EcVFryGRA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M8LFpjc2nTerMXyWYH3zpA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;">Let's take what seems like a straightforward recommendation: enable MFA for all users.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Sounds simple, right? But actually implementing it requires understanding:</p><ul><li style="text-align:left;">Which users already have MFA and which don't</li><li style="text-align:left;">Whether you have Conditional Access policies that conflict</li><li style="text-align:left;">Which applications might break with MFA enforcement</li><li style="text-align:left;">How to handle service accounts and automated processes</li><li style="text-align:left;">What exceptions might be legitimately needed</li><li style="text-align:left;">How to communicate changes to users effectively</li></ul></div><p></p></div>
</div></div></div><div data-element-id="elm_a3fkSF-WT5KZ-9kEAxjWzg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_qZM33ElEbF2CPX5Y3Is_Nw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_71hiBfhvElEi_BGxYswtLQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Get any of these wrong and you'll spend more time fixing problems than you saved by implementing the recommendation.</p><p><br/></p><p>This pattern repeats across every recommendation in your Secure Score. What looks like a configuration change on the surface requires strategic thinking about business impact, technical dependencies, and change management.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_G0cUKdV0pUQvS91D2i12vA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_E9XcXYXB6FJ8S9WUq5PX2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_4oQjhwFdHGKs2i0wGEUxyg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_bwJUEViA89oZn1g4Rri9fg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Why Quick Wins Aren't Always Quick</strong></h3></div>
<div data-element-id="elm_578hCOsLygn0bZAGT6JTGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>IT teams often start with &quot;quick wins&quot;—recommendations that promise high point values with supposedly minimal effort.</p><p><br/></p><p>The problem is that &quot;quick&quot; depends entirely on your environment's current state and complexity. Blocking legacy authentication might take 15 minutes in one organization and require weeks of application modernization in another.</p><p><br/></p><p>More importantly, chasing points without understanding impact leads to a dangerous pattern: implementing changes that raise your score but don't actually improve your security posture in meaningful ways for your specific risk profile.</p><p><br/></p><p>The organizations that successfully improve their Secure Score don't focus on quick wins first. They focus on <em>right</em> wins—improvements that align with their actual threat landscape and business priorities, regardless of point value.</p></div><p></p></div>
</div><div data-element-id="elm__YBKGX_onYgevAmaRtG31g" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm__YBKGX_onYgevAmaRtG31g"] div.zpspacer { height:13px; } @media (max-width: 768px) { div[data-element-id="elm__YBKGX_onYgevAmaRtG31g"] div.zpspacer { height:calc(13px / 3); } } </style><div class="zpspacer " data-height="13"></div>
</div></div></div></div></div><div data-element-id="elm_Qp2uEQGYMPP1y2vGHbz7CQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z6XB3hcNe1eo7BXOIkvRdA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_65xUQY6WM2cbj_PE8JN7AA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_khgYBcfzU41_Py12a0ka0Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_khgYBcfzU41_Py12a0ka0Q"] .zpimage-container figure img { width: 429px !important ; height: 601px !important ; } } @media (max-width: 767px) { [data-element-id="elm_khgYBcfzU41_Py12a0ka0Q"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_khgYBcfzU41_Py12a0ka0Q"].zpelem-image { margin-block-start:26px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Copy%20of%20Envelope%20Template%20-500%20x%20700%20mm-.png" width="415" height="233.44" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm_LBe_Y0ta1_1OjPOu9bLD6Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Y5Jmkw29O69AHchIIYMn1g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>The Sustainability Problem</strong></h4></div>
<div data-element-id="elm_JCDU7G1M4EWUxy9xAy5Yug" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;">Here's what happens in most organizations: someone dedicates focused time to Secure Score improvements. Over a few weeks or months, the score increases. Victory!</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Six months later, the score has drifted back down. Temporary exceptions became permanent. New users onboarded without inheriting security policies. Applications deployed without security review.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">The improvements weren't sustained because they weren't integrated into operational processes. Security became a project with an end date, not an ongoing practice.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Sustainable Secure Score improvement requires building security into your regular workflows:</p><ul><li style="text-align:left;">User onboarding processes that automatically apply security policies</li><li style="text-align:left;">Regular reviews of exceptions and elevated access</li><li style="text-align:left;">Monitoring that flags when configurations drift from baseline</li><li style="text-align:left;">Documentation that survives staff turnover</li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">Without these processes, you're constantly fighting to maintain improvements instead of compounding them over time.</p></div><p></p></div>
</div></div></div><div data-element-id="elm_oJDmMSkXXK8nknzJNpN11Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_8cl7bRsXYmxkEfOlq8cxJw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_1OCl_Yyy7MqxgiBASWmwuA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_1OCl_Yyy7MqxgiBASWmwuA"] div.zpspacer { height:11px; } @media (max-width: 768px) { div[data-element-id="elm_1OCl_Yyy7MqxgiBASWmwuA"] div.zpspacer { height:calc(11px / 3); } } </style><div class="zpspacer " data-height="11"></div>
</div></div></div><div data-element-id="elm_LVK9gJgdTGYkpIkw1mgOHA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_GTNmgfoN7hshxF4VAOyDug" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_wQ0YJQ3dSbMEXATi9CTN4g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_wQ0YJQ3dSbMEXATi9CTN4g"] .zpimage-container figure img { width: 406px !important ; height: 568px !important ; } } @media (max-width: 767px) { [data-element-id="elm_wQ0YJQ3dSbMEXATi9CTN4g"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_wQ0YJQ3dSbMEXATi9CTN4g"].zpelem-image { margin-block-start:26px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Copy%20of%20Envelope%20Template%20-500%20x%20700%20mm-%20-2-.png" width="415" height="233.44" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm__cOiTFTXBKwJaFdDwcAvfw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_diniPTUVK1srAluvWdTE-Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span>What Actually Works</span></strong></h4></div>
<div data-element-id="elm_7x1BBI28dYNVasnINtIaJA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:left;"></p><div><p>Organizations that successfully improve and maintain their Secure Score approach it systematically:</p><p><br/></p><p>They <strong>understand their current state</strong> before implementing anything. Where are the critical gaps? Which recommendations address real risks versus checking compliance boxes? What's the business impact of each change?</p><p><br/></p><p>They <strong>prioritize strategically</strong>, not by points. High-impact security improvements for their specific environment come first, even if they're worth fewer points than easier changes.</p><p><br/></p><p>They <strong>test before deploying widely</strong>. Pilot changes with a small group. Identify and address issues. Then expand systematically with proper change management.</p><p><br/></p><p>They <strong>build monitoring into operations</strong>. Regular review processes catch drift before it becomes significant. Documentation ensures knowledge doesn't live in one person's head.</p><p><br/></p><p>They <strong>know when to get help</strong>. Some improvements require specialized expertise most internal teams don't have time to develop. Recognizing this early prevents wasted effort on approaches that won't work.</p></div><p style="text-align:left;"></p></div><p></p></div>
</div></div></div><div data-element-id="elm_OgXlxZsrrt6SI2qVnSUWvA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_-Mmg90cf82ynR1amFtMGuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Vx-0p7FsVleKfsxNYug3TA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_Vx-0p7FsVleKfsxNYug3TA"] div.zpspacer { height:16px; } @media (max-width: 768px) { div[data-element-id="elm_Vx-0p7FsVleKfsxNYug3TA"] div.zpspacer { height:calc(16px / 3); } } </style><div class="zpspacer " data-height="16"></div>
</div></div></div><div data-element-id="elm_bjEEHvkc1yCx-BEyGGfFyA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Q4zSKnRD-LdBFfEw6FYFng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_tfhCd3amJOz618goLvTruA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_tfhCd3amJOz618goLvTruA"] .zpimage-container figure img { width: 419px !important ; height: 587px !important ; } } @media (max-width: 767px) { [data-element-id="elm_tfhCd3amJOz618goLvTruA"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_tfhCd3amJOz618goLvTruA"].zpelem-image { margin-block-start:26px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Copy%20of%20Envelope%20Template%20-500%20x%20700%20mm-%20-1-.png" width="415" height="233.44" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm_4Jp8Qt57e6eUMpKjRfrC6g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Lsiga7oA_Z6iWAZrgp1jiQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span><span>The Path Forward Depends on Your Situation</span></span></strong></h4></div>
<div data-element-id="elm_QvT6TZN9oXdD2N7ddV6KBg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:left;"></p><div><p></p><div><p>Some organizations can improve their Secure Score significantly with internal resources—if they have the right strategic approach and dedicate consistent effort over time.</p><p><br/></p><p>Others reach a plateau where further improvement requires either:</p><ul><li>Specialized Microsoft 365 security expertise their team hasn't developed</li><li>Time investment their team genuinely doesn't have capacity for</li><li>Licensing and tools their current budget doesn't include</li></ul><p><br/></p><p>Neither scenario is wrong. The question is whether you're willing to accept your current risk level or invest in further improvement.</p><p><br/></p><p>But regardless of which path you choose, attempting Secure Score improvement without a systematic approach leads to wasted effort, broken workflows, and minimal sustained progress.</p></div><p></p></div><p style="text-align:left;"></p></div><p></p></div>
</div></div></div><div data-element-id="elm_SJNi1daO3PM_7wp7Ersb2w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_a9_3RGSvZIvU3QopJe393Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_kkldWLLpYAkSy2aDw8y0aQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_kkldWLLpYAkSy2aDw8y0aQ"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_kkldWLLpYAkSy2aDw8y0aQ"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div><div data-element-id="elm_o5V014xZlvxEwz40hIGuOw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_4vF-3aZ_ZSspc-c2DyJfHA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">See the Strategic Approach In Action</strong></h3></div>
<div data-element-id="elm_7vhCsSfoj1zvoU6fZU2vLw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Understanding <em>why</em> most Secure Score improvement efforts fail is one thing. Knowing <em>how</em> to avoid those pitfalls and implement changes that actually stick is another.</span></p></div>
</div><div data-element-id="elm__dcQ8-w2vvCv_K7rnoJnsg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Join our security analyst, Kyle Farr, on&nbsp;<span><strong>10th of</strong></span> February 2026</strong>&nbsp;for a live demonstration of strategic Secure Score improvement:</p><ul><li><strong>Current state analysis</strong> - How to assess your score breakdown and identify what actually matters for your risk profile (not just point values)</li><li><strong>Prioritization framework</strong> - The decision criteria for determining which recommendations to tackle first based on business impact and technical dependencies</li><li><strong>Live implementation walkthrough</strong> - Watch a real security control get configured with proper testing and rollback planning</li><li><strong>Monitoring and sustainability</strong> - Building the processes that catch drift before it degrades your security posture</li><li><strong>Q&amp;A for your specific challenges</strong> - Get answers about your environment's blockers and constraints</li></ul></div><p></p></div>
</div><div data-element-id="elm_j8_A8H_b2IF9rzwYHFJR5A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>This isn't theory or generic advice. It's a practical demonstration of the systematic approach that separates successful Secure Score improvement from wasted effort.</span></p></div>
</div><div data-element-id="elm_B7HfdqeEPNaHkI6qWGD28g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>📅 February 10, 2026 | 4:00 PM - 5:00 PM SAST</span></p></div>
</div><div data-element-id="elm_ghTp-gP12uHOTQWn7Qwbew" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://events.teams.microsoft.com/event/0200f51a-7f96-496e-9887-58307aafc957@61521a12-5ef9-4e8d-b880-ea83395070fb" target="_blank"><span class="zpbutton-content">Register For FREE</span></a></div>
</div><div data-element-id="elm_6A-zwmHCULEWLQeNtBKQZQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_6A-zwmHCULEWLQeNtBKQZQ"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Copy%20of%20Copy%20of%20Copy%20of%20Brown%20Orange%20Photo%20Collage%20Autumn%20Vibes%20LinkedIn%20Post%20%20.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_1h_dlkmGa2xkx6ZJKc5iaw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>If you've been stuck between understanding your security gaps and actually addressing them effectively, this is the bridge you need.</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 05 Feb 2026 20:45:54 +0000</pubDate></item><item><title><![CDATA[The Five Most Common Vulnerabilities Uncovered During Penetration Testing ]]></title><link>https://www.gtconsult.com/blogs/post/the-five-most-common-vulnerabilities-uncovered-during-penetration-testing-real-life-lessons</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/CRITICAL VULNERABILITIES THUMBNAIL.png"/>Discover the five most common vulnerabilities from real 2023-2025 breaches. Learn how weak passwords bankrupted 23andMe and unpatched systems exposed 193M records—and how penetration testing prevents these devastating attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uJ3z3gRBSmSmvURjDSW3mQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HKs2gz2KTlSmhFu2iKO2_w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8-n6u601RPWAGdXGFIBnKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KQPkFfIFTgGhrXdNyq910g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Real-Life Lessons</span></h2></div>
<div data-element-id="elm_88zBcHc0TaiAo3Gs11YSjg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Now, more than ever, most organizations only discover their security weaknesses after an attack. But it does not have to be that way, a lot these attacks could have been prevented if organizations just had a proactive approach rather than a reactive one when it comes to their cybersecurity.&nbsp;</span></p></div>
<div><p style="margin-bottom:10.6667px;"><span>Penetration testing simulates real-world attacks to identify and help remediate security vulnerabilities before malicious actors can exploit them.</span></p></div>
</div><p></p></div></div><div data-element-id="elm_Nyzryuswbot45m5f24atgw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>The Uncomfortable Truth About Modern Cybersecurity</span></b></span></h2></div>
<div data-element-id="elm_eU25B0wsXhc0dzePoglOqw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>If you’re a security professional, and even if you aren’t actually, this question may have crossed your mind before:</span></p><p><span>&nbsp;</span></p><p><span style="font-style:italic;color:rgb(166, 206, 57);"><strong>**If Microsoft, Google, and healthcare giants with unlimited security budgets can be breached, what chance do we have?**</strong></span></p><p><span>&nbsp;</span></p><p><span>The answer might surprise you—and it starts with understanding that these breaches weren't the result of sophisticated attack chains or unknown zero-day exploits.</span></p><p><span>&nbsp;</span></p><p><span>They failed because of the same vulnerabilities we discovered in majority of penetration tests.</span></p></div><p></p></div>
</div><div data-element-id="elm_wHX25U9BHKr6rWkmEl1-bA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>Why This Matters to Your Organization</span></b><span>&nbsp;</span></span></h2></div>
<div data-element-id="elm_VjxvhII64Pgn2lwrozKLRQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>You might be thinking:&nbsp;</span></p><p><span><br/></span></p><p><span style="font-style:italic;color:rgb(166, 206, 57);"><strong>*&quot;We're not Microsoft. We're not a target for these attacks.&quot;*</strong></span></p><p><span>&nbsp;</span></p><p><span>That's precisely the mindset that creates vulnerability.</span></p><p><span>&nbsp;</span></p><p><span>The attacks that compromised Microsoft or any of the organizations in this blog weren't sophisticated. They were opportunistic. Attackers used password spraying—a technique so basic it's covered in entry-level security courses.</span></p><p><span><br/></span></p><p><span>Your organization doesn't need to be &quot;important enough&quot; to be targeted. You just need to be vulnerable enough to be profitable.</span></p><p><span><br/></span></p><p><span>Let's have a look at the five common vulnerabilities we've uncovered during penetration testing.</span></p><p><span>&nbsp;</span></p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_swwpEbiD9b9kRv574PwfjA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MF-CrQAOWtnkLiwL6mLzOg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_LszLbRe4uqhpYpJcKYbozQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_cCPWvW4-aCiziCKkKpnl2g" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_cCPWvW4-aCiziCKkKpnl2g"] .zpimageheadingtext-container figure img { width: 500px ; height: 333.44px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/strong-and-weak-easy-password-concept-2025-02-21-00-00-34-utc.jpg" data-src="/Blog%20Site/strong-and-weak-easy-password-concept-2025-02-21-00-00-34-utc.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><strong style="color:rgb(0, 27, 76);">1. Weak or Reused Passwords</strong></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><p><strong>23andMe (2023-2024)</strong>: In 2023, 23andMe experienced a credential stuffing attack that exposed genetic data of approximately 7 million customers—roughly half of the service's userbase. The breach had devastating consequences, with the biotech company filing for Chapter 11 bankruptcy in March 2025. The UK Information Commissioner's Office fined 23andMe £2.3 million for failing to implement mandatory multi-factor authentication and secure password requirements. This demonstrates the catastrophic business impact that credential-based attacks can have on organizations.</p><p><br/></p><p><span><strong>Snowflake Breaches (2024):</strong> The Snowflake breach in late 2024 exposed customer data where improperly secured accounts—some without multifactor authentication—were used to exfiltrate information. This breach affected multiple organizations using the platform and highlighted how weak authentication practices can have cascading effects across an entire ecosystem.</span><br/></p><p><span><br/></span></p><p><span></span></p><div><p><strong>The Scale of the Problem:</strong> In 2025, researchers discovered 16 billion exposed credentials from 30 different databases, primarily harvested by infostealer malware campaigns, representing the largest credential breach compilation recorded to date. Analysis of data leaks from 2024-2025 reveals that 94% of passwords are reused or duplicated, with only 6% being unique.</p><p>Weak or reused passwords are one of the easiest ways for attackers to gain unauthorized access. Despite widespread use of multi-factor authentication (MFA), poor password practices remain a primary entry point for attacks.</p></div><br/><p></p><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Enforce complex, unique passwords and implement MFA</li><li>Conduct regular password audits</li><li>Educate employees about password hygiene</li></ul><div><span><strong><br/></strong></span></div><div><span><strong>Pen Test Role:</strong> Pen testers use brute-force attacks, credential stuffing, and password spraying to uncover weak or reused passwords across systems.</span><br/></div></div><p></p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_YHs4ovdUB14TNwZexIE1KA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nM3WSnS_zhXI5ty4oFyazA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_HErHEM45O1qgRZV61i8iuA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pQQWX2wwFnnQP-U_PV39xQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>2. Unpatched Systems &amp; Software</strong></span></h2></div>
<div data-element-id="elm_UX7pjrT-3QrFCu5VyfpvpQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Change Healthcare (2024):</strong> In February 2024, United Health-owned prescription processor Change Healthcare suffered a massive ransomware attack that cost the company $2.457 billion and exposed the private data of approximately 193 million individuals—making it the largest healthcare data breach ever reported. The ALPHV/BlackCat ransomware group exploited a Citrix remote access service that lacked multi-factor authentication. This breach disrupted healthcare services across the United States, affecting 94% of hospitals and preventing billions of dollars in claims processing.</span></p><p><span><br/></span></p><p><span></span></p><div><p><strong>MOVEit Transfer (2023):</strong> In May 2023, the CLOP ransomware gang exploited a zero-day SQL injection vulnerability (CVE-2023-34362) in Progress Software's MOVEit Transfer application. By the end of 2023, the attack had compromised more than 2,700 organizations and exposed approximately 93.3 million personal records, with total damages estimated at $12.15 billion. High-profile victims included British Airways, the BBC, Shell, the U.S. Department of Energy, and numerous universities. This breach highlighted the critical importance of rapid vulnerability patching and the devastating consequences of zero-day exploits.</p><p><br/></p><p><strong>AVTECH IP Cameras (2024):</strong> In August 2024, security researchers discovered an unpatched vulnerability in AVTECH IP cameras used in critical infrastructure was being exploited to spread Mirai malware, despite the vulnerability being known since 2019. This five-year delay in addressing a known vulnerability put essential services at risk.</p></div><p></p></div>
</div><div data-element-id="elm_jfKxukBsa3fdBF4ViATjAw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jfKxukBsa3fdBF4ViATjAw"] .zpimagetext-container figure img { width: 500px ; height: 356.88px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/keys-to-deploy-and-patch-2025-10-13-10-07-42-utc.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span>Outdated systems and unpatched software are among the most common vulnerabilities exploited by attackers. Missing security updates can allow attackers to leverage known vulnerabilities to compromise systems.</span></p><p><span><br/></span></p><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Maintain a robust patch management program</li><li>Conduct regular vulnerability scans</li><li>Prioritize patching critical systems</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers identify unpatched systems and attempt to exploit publicly known vulnerabilities (CVEs) to assess the potential impact.</p></div><br/><p></p></div>
</div></div></div></div></div></div><div data-element-id="elm_VXvtA4j7W9MVMkGbmcn8zw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SoJwQ82Dr6ZrWWwyzcDZwQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_XF2F0hhpplR2gg0ePlbjWg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SlJrOxZAypPFF91NfIHnJQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>3. Misconfigured Permissions &amp; Access Controls</strong></span></h2></div>
<div data-element-id="elm_5xMQdQebX6Gr86Grt8KvVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Microsoft Breach (2024):</strong> In late 2023 (discovered January 2024), state-backed cyber espionage group Midnight Blizzard (also known as APT29, Nobelium, and CozyBear) gained access to Microsoft leadership and cybersecurity team emails. The attackers used password spraying attacks against a legacy test account that lacked multi-factor authentication and had elevated access. They then exploited a legacy OAuth application that granted full access to all mailboxes in the organization. Even one of the world's leading technology companies fell victim to misconfigured access controls and orphaned test accounts.</span></p></div>
</div><div data-element-id="elm_keLX2Wj9ocUXXEu4d-jnqA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Marks &amp; Spencer (2025):</strong> In May 2025, M&amp;S suffered a major cyberattack attributed to the &quot;Scattered Spider&quot; group deploying DragonForce ransomware, potentially linked to vulnerabilities in its IT outsourcing partner Tata Consultancy Services, with an expected £300 million profit loss. This breach demonstrates how misconfigurations in third-party relationships can have massive financial consequences.</span></p></div>
</div><div data-element-id="elm_BrS7AkcFfza4Vuq4-TD0yA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Western Alliance Bank (2025):</strong> Western Alliance Bank experienced a data breach in March 2025, stemming from exploitation of a zero-day vulnerability in a third-party secure file transfer tool provided by Cleo. The Clop ransomware group gained unauthorized access to approximately 22,000 customers' sensitive information, highlighting vulnerabilities in supply chain security.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_3gVr-Be2hrQkMlsK06WgJg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZnqnRkvmZn1h7AjtZMSCkg" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_7Wkws9QEStbs3SeYAQXQwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_7Wkws9QEStbs3SeYAQXQwQ"].zpelem-col{ margin-block-start:-164px; } </style><div data-element-id="elm_NhAMyyxJb524iAnkaX_fWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NhAMyyxJb524iAnkaX_fWA"].zpelem-text { margin-block-start:171px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Enforce least-privilege access principles</li><li>Regularly review and audit permissions</li><li>Segment networks and sensitive data appropriately</li><li>Remove legacy and test accounts with elevated privileges</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers attempt privilege escalation, unauthorized access, and lateral movement to uncover misconfigurations.</p></div><p><span><br/></span></p><p><span><br/></span></p></div>
</div></div><div data-element-id="elm_eM9f85hggJ45zoOhr-u3NA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew"] .zpimage-container figure img { width: 534px !important ; height: 339px !important ; } } @media (max-width: 767px) { [data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew"] .zpimage-container figure img { width:415px ; height:276.39px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Screenshot%202025-10-20%20150919.png" width="415" height="276.39" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_-GZ5iHujlFHvkHyglKYXng" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_JZBVUmwXys8bi4-eH4424g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_SA67up74noiBNTH5K3CodA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_tA36bCw4yeJqIlnMLM06Fw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>4. Insufficient Network Monitoring &amp; Logging</strong></span></h2></div>
<div data-element-id="elm_7SJrg3a0pMuKH-lFO4k4yQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Office of the Comptroller of the Currency (2025):</strong> In early 2025, the U.S. OCC identified suspicious interactions between a system administrative account and internal user mailboxes—activity that had gone undetected for months, raising concerns about the agency's visibility into its systems and the effectiveness of its logging practices. This breach at a federal financial regulator highlighted how even government agencies struggle with monitoring gaps.</p><p><br/></p><p><strong>AT&amp;T Breach (2022-2024):</strong> AT&amp;T confirmed a significant data breach involving unauthorized access to its Snowflake cloud storage environment. The breach occurred between May 1, 2022, and October 31, 2022, but wasn't detected until April 2024—a detection delay of nearly two years. The breach exposed over 86 million records, including Social Security Numbers. This prolonged detection window allowed attackers extensive time to access and potentially monetize sensitive customer data.</p><p>Without effective monitoring and logging, suspicious activity can go undetected, giving attackers more time to exploit vulnerabilities and exfiltrate data.</p></div><p></p></div>
</div><div data-element-id="elm_TSYZKIxBq06RfvT0EPudSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Prevention:</strong></p><ul><li>Implement centralized logging and real-time monitoring solutions</li><li>Regularly analyze logs for anomalies</li><li>Set up automated alerts for suspicious activity</li><li>Establish baseline behavior to detect deviations</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers attempt to bypass detection and exfiltrate data to identify gaps in monitoring systems and incident response processes.</p></div><p></p></div>
</div><div data-element-id="elm_82n8Go8UnMobWIli9PqS9g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>5. Human Error &amp; Social Engineering Vulnerabilities</strong></span></h2></div>
<div data-element-id="elm_s35FSM2BjhpANhWBhCwhGA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_s35FSM2BjhpANhWBhCwhGA"] .zpimage-container figure img { width: 1110px ; height: 459.26px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/pensive-doubtful-businessman-brainstorming-ideas-2025-02-18-02-35-46-utc.JPG" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_qwwrJ76KvnNj1w3HinRCng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Coinbase (2025):</strong> In May 2025, Coinbase confirmed a breach when cybercriminals bribed overseas support staff to leak sensitive customer data, including names, birthdates, email addresses, and partial Social Security numbers. Attackers used this data to orchestrate highly targeted social engineering attacks against customers. This breach highlighted the vulnerability of outsourced operations and the human element in security, demonstrating that even financial incentives can compromise insider threats.</p><p><br/></p><p><strong>Google Salesforce Breach (2025):</strong> In August 2025, Google confirmed a data breach from a compromised Salesforce-hosted corporate database. The hacking group ShinyHunters gained access through social engineering by impersonating IT support staff and tricking a Google employee into approving a malicious application. Even at tech giants with sophisticated security teams and trained personnel, social engineering remains remarkably effective.</p><p><br/></p><p><strong>Workday Breach (2025):</strong> On August 18, 2025, Workday disclosed a data breach stemming from a social engineering campaign where threat actors impersonated HR or IT staff. They contacted employees by phone or text to trick them into granting access to a third-party CRM platform. This demonstrates the evolving sophistication of social engineering tactics and the importance of verification procedures for access requests.</p><p>Humans are often the weakest link in cybersecurity. Attackers use phishing, pretexting, impersonation, and other social engineering tactics to manipulate employees into granting access.</p></div><p></p></div>
</div><div data-element-id="elm_Rcv30wOoXGc3U4DlgVEnNA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Prevention:</strong></p><ul><li>Conduct ongoing security awareness training</li><li>Simulate phishing campaigns regularly</li><li>Implement multi-factor authentication and verify requests for sensitive actions</li><li>Establish clear protocols for verifying identity before granting access</li><li>Create a culture where employees feel comfortable questioning suspicious requests</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers simulate phishing attacks and social engineering scenarios to assess employee awareness and identify weak points in organizational security culture.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_55eupCmehmJZB7u8g3Wyxw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_icfhLNsVUAXd3grU_izZ3g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_bdveC3dLaCgF1liOFwQJog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_MFeHPn3zwVAiRpcO4BOWtw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>Conclusion</strong></span></h2></div>
<div data-element-id="elm_png9rh5TOgppzwbsVA6hGQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Penetration testing serves as a proactive approach to identifying and mitigating security vulnerabilities. By addressing these common weaknesses, organizations can significantly enhance their security posture. The breaches highlighted above demonstrate that no organization—regardless of size, industry, or technical sophistication—is immune to cyber attacks when fundamental security controls are not properly implemented and maintained.</span></p></div>
</div><div data-element-id="elm_n3e9qx_EEblhReZkq0oXfA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div><div data-element-id="elm_JwnRr7WVo9656OyLMHE81A" data-element-type="section" class="zpsection zplight-section zplight-section-bg zscustom-section-145 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_XflqE4kytax2YPuXh-KpMg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Hh3etpQ3mU32ZhQSM5vEMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M2HwpZrIAYpyg9iR0Jtp_g" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_M2HwpZrIAYpyg9iR0Jtp_g"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; margin-block-start:24px; } </style><div data-element-id="elm_89sFocecBJmMVD_fW0Dq8A" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_89sFocecBJmMVD_fW0Dq8A"] div.zpspacer { height:6px; } @media (max-width: 768px) { div[data-element-id="elm_89sFocecBJmMVD_fW0Dq8A"] div.zpspacer { height:calc(6px / 3); } } </style><div class="zpspacer " data-height="6"></div>
</div><div data-element-id="elm_-G9Zq8h74gIZYTgsm6l7XQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-G9Zq8h74gIZYTgsm6l7XQ"].zpelem-text { margin-block-start:-10px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>At GTconsult, we specialize in penetration testing services tailored to your organization's needs. Our team of experts utilizes the latest tools and methodologies to uncover vulnerabilities and provide actionable recommendations to fortify your defences.</p><p><br/></p><p>Don't wait for a breach to occur. Contact GTconsult today to schedule a penetration test and take the first step towards securing your organization's future.</p></div><p></p></div>
</div><div data-element-id="elm__Rq63HSz2DN0RSjD4-FMdg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">Get a Penetration Test</span></a></div>
</div></div></div><div data-element-id="elm_IJZGal7aUaeVWT8KzEG-vg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zsorder-one zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video{ margin-block-start:42px; } @media (max-width: 767px) { [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="304" src="https://www.youtube.com/embed/e4YSke1x13o?si=0gkyiijiHFyz0FoL" frameborder="0" allowfullscreen></iframe></div>
</div></div></div><div data-element-id="elm_UzyVib124nFr7V_sv9U7-Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HAVbHCAfaLzb-qi_wX2dYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA"] div.zpspacer { height:4px; } @media (max-width: 768px) { div[data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA"] div.zpspacer { height:calc(4px / 3); } } </style><div class="zpspacer " data-height="4"></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 22 Oct 2025 13:25:44 +0000</pubDate></item></channel></rss>