The Greek hero Achilles was a great warrior, much feared for his fighting skills and his daring courage. But beneath his unbeatable facade, he had a vulnerability that led to his downfall—his heel.
A vulnerability, in the field of cyber security, is a weakness in your computer systems that an attacker can exploit. Computers, digital devices, and software have many known and undiscovered flaws in the way they are designed. For example, many popular devices have insufficient user authentication, and some software may not encrypt their data. These weaknesses render them vulnerable to attacks.
Hackers are always searching for vulnerabilities to get into a target computer. Once in, they are able to steal sensitive data or sabotage the organization’s operations. A popular example of this are the default passwords to software and devices, which admins often forget to change. Hackers easily guess these and are able to enter the system.