Top 10 Configuration Mistakes that Leave Your System Vulnerable