- Weak Passwords: Use of easily guessable or default passwords. - Outdated Software: Running software that has not been updated, which can have security vulnerabilities. - Insufficient Training: Staff not adequately trained in security protocols. - Poor Access Control: Unauthorized personnel having access to sensitive information. - Lack of Incident Response Plan: No clear plan for responding to security incidents.