For those who are more my age (suffice it to say, I'm still in my 50s...just!), and took to computing back in our 20s, we remember having to configure EVERYTHING! "Plug-n-play" wasn't even thought of back then, let alone dreamed about. But it did give those of us with some skills the chance to tweak and fiddle. While I, mostly, welcome the new age in computing where things just work (unless they don't!), these advances have made us lazy and un-attuned to potential threats to security. Most of us don't want to spend time setting up a piece of equipment or a software program, we demand that it works "Straight-out-of-the-box" without any intervention by us. I certainly like that for almost all equipment, but for software, that's a different matter.
Why "out-of-the-box" settings can be bad
While this post can be related to any sort of software, it really references web design extensions. Apart from the fact that we're web designers, these extensions present hackers with their best opportunities for data theft. While doing updates on one of the sites we manage this week, the backup extension we use (for obvious reasons we aren't going to name it!) gave us a
