{"id":7620,"date":"2020-07-19T04:22:09","date_gmt":"2020-07-19T11:22:09","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7620"},"modified":"2023-07-10T14:48:56","modified_gmt":"2023-07-10T21:48:56","slug":"how-safe-are-database-applications","status":"publish","type":"post","link":"https:\/\/10.42.32.162\/articles\/how-safe-are-database-applications\/","title":{"rendered":"How Safe are Databases?"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Cyber threat actors have been working hard during these pandemic times. The lockdown that came at the wake of this virus attack was sudden and unplanned. Systems, infrastructure, and sensitive information that was hitherto viewed within the secure walls of one\u2019s office is now being accessed through insecure connections and unsafe laptops from one\u2019s home.<\/span><\/strong><\/p><\/blockquote>

The year 2020 will probably go down in history as the worst year for database breaches and we are only halfway through it.<\/p>

We recently released a report series called \u2018Cyber Risk in Working Remotely\u2019 where we examined popular database solutions for vulnerabilities.<\/p>

Key Findings<\/strong><\/h3>