How was the breach allowed to occur? Why was the server vulnerable?
Two key factors likely played a role in creating an insecure environment: lack of adequate complexity in passwords and usernames, and lack of timely implementation of software updates and security patches. As UAS is an auxiliary unit, its server was operated independently from the University network.