Secplicity Blog

Cybersecurity Headlines & Trends Explained

The Security Gap That Lets Attackers Walk Right In

If you ask most security-conscious organizations about their priorities, the answers are usually familiar: endpoint detection and response, identity and access management, network segmentation, cloud security, vulnerability management, and more. On paper, many teams know exactly what strong security should look like. 

In real-world environments, the bigger problem is often not the tool itself. It is assuming you are protected when key security controls have only been partially deployed. 

That is where many breaches begin. 

Over the years, I have seen organizations spend significant time debating which product is best: the best EDR, the best firewall, the best cloud security stack. Those decisions matter, but they are not always the most important ones. In many customer environments, critical protections are never fully deployed, consistently enforced, or regularly reviewed. That leaves gaps attackers are quick to exploit. 

The Real Risk Is Incomplete Coverage 

Most security programs do not fail because there were no controls in place at all. They fail because coverage was inconsistent. 

That inconsistency usually comes down to a few recurring issues: 

  • Missing processes, procedures, or documentation 
  • Poor enforcement of security policies 
  • Limited time or resources for full implementation 
  • Lack of routine validation and review 

These are not abstract operational problems. They create real exposure. 

A security control only works where it exists. An EDR platform cannot detect activity on an endpoint where it was never installed. MFA cannot protect accounts that were excluded. Network segmentation cannot limit lateral movement if overlooked subnets still have broad internal access. 

Attackers do not need to defeat your best defenses. They just need to find the system, subnet, service account, or unmanaged device that was missed. 

A Real-World Example of How Small Gaps Become Major Incidents 

Here is an example based on a real-world incident response case, with identifying details changed. 

The first sign of trouble was a detection involving an attempt to access credentials on a monitored endpoint. The SOC team responded quickly, contained the endpoint, and identified that a remote PowerShell command had been executed from another internal endpoint that was not being monitored. After working with the customer, it became clear that the unmonitored device was a supported endpoint, but EDR had never been installed on it. Because that system lacked visibility, root cause analysis was immediately limited. 

At that point, the customer was given a set of recommendations: 

  • Reset all accounts 
  • Prioritize patching critical and high-severity vulnerabilities 
  • Deny login access for service accounts 
  • Ensure all subnets were included in vulnerability scanning 
  • Review internal and external firewall rules 
  • Enforce MFA across all accounts 

The customer confirmed they had reset passwords, deployed EDR to supported endpoints, and were working through the remaining recommendations. 

Five days later, their hypervisor was encrypted by ransomware. 

What Actually Went Wrong 

The attacker was ultimately able to authenticate using a service account. Later investigation showed that while user passwords had been reset, service accounts had not. Login restrictions had also not been applied to those accounts as recommended. 

The deeper issue, however, was even more revealing. 

The customer had forgotten about a small subnet containing a single phone system. That subnet had no meaningful restrictions and multiple Internet-facing ports forwarded directly to it, including administrative access and SSH. When the system was reviewed, it was found to contain multiple critical vulnerabilities, including a remotely exploitable SSH flaw. It had not been patched since initial installation years earlier. That neglected device turned out to be the initial point of entry in both incidents. 

From there, the attacker moved laterally across the network. The path ultimately involved an unmonitored contractor endpoint and direct movement to the hypervisor. The contractor’s role had nothing to do with the hypervisor, but because segmentation and access controls were weak, the path was available. To make matters worse, the hypervisor shared credentials with the phone system, and those credentials had already been exposed through the vulnerable device. The hypervisor itself was unsupported and out of date. 

This is what modern security breakdowns often look like. Not one catastrophic failure, but several smaller ones chained together. 

The Lesson: Attackers Exploit What Organizations Overlook 

Security leaders sometimes ask whether they need the very best tools on the market. That is not the first question I would ask. 

The better question is this: are your existing controls fully deployed, enforced, and reviewed often enough to matter? 

In this case, even a less sophisticated EDR product likely would have detected the malicious activity on the unmanaged endpoint, if it had actually been installed. But no solution can protect systems it cannot see. 

That is why security maturity is not just about tool selection. It is about operational discipline. 

Five Practical Lessons for Security Teams 

1. Close the implementation gap 

A partially deployed control is often treated as if it provides full protection. It does not. Inventory what is actually covered today, then identify the gaps between policy and practice. 

2. Act on security recommendations quickly 

When your security team, MDR provider, MSP or MSSP gives you remediation guidance, treat it as part of the incident response, not a future improvement project. If a recommendation cannot be completed immediately, compensating controls should be put in place. 

3. Segment aggressively 

Users should not have broad access to critical systems by default. Third-party devices, contractor systems, and black-box technologies should never have unrestricted reach across the network. Segmentation reduces the blast radius when something is missed. 

4. Hold third parties to the same standard 

Contractors, outside vendors, and specialty appliances are frequently overlooked in security programs. They should not be. If they connect to your network or environment, they should meet the same baseline security requirements as internal assets. 

5. Treat your MDR or MSSP as a true security partner 

A strong provider is not just there to send alerts. They should be part of your extended security team, helping you investigate, prioritize, and reduce risk over time. But that relationship only works when recommendations are taken seriously and acted on. 

What This Means in Practice 

The organizations that recover fastest and resist attackers most effectively are not always the ones with the flashiest security stack. More often, they are the ones that do the fundamentals well, consistently, and completely. 

Security gaps are rarely exciting. They are often administrative, procedural, or buried in systems everyone forgot to review. But those are exactly the weaknesses attackers count on. 

If there is one takeaway here, it is this: your security posture is not defined by the controls you purchased. It is defined by the controls you actually implemented, enforced, and maintained. 

That is where resilience starts.