Content area
Cyberattacks continue to happen due to the evolution of technology, vulnerabilities in systems, human error, the potential of significant financial gain for unauthorized users/hackers, and the relative ease of launching attacks through readily available tools and knowledge. The reviewed literature highlighted the significance of the unknown areas centering around unauthorized users accessing routers. This exploratory qualitative study identified the underlying causes of gaining access that allow unauthorized users to acquire sensitive information from routers in large corporations with over 2000 employees. A sample size of 9 participants from across the United States completed eleven open-ended questions via Zoom virtual interviews. The participants provided their experiences with security breaches, factors surrounding these breaches, and security tools for detecting threats. The research found that the underlying causes were vulnerabilities, stolen credentials, misconfigurations, lack of education of security tools and best practices, complacency of employees, weak passwords, unpatched systems, phishing attacks, outdated network equipment or infrastructure, and cyber attacks (distributed denial of service (DDOS), malware, rootkits, and trojan horses). The future needs to conduct case studies on how the underlying causes hinder a company/organization from properly securing their network and how not securing network devices such as routers impacts a company or organization.