Skip to content

Weaknesses Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees
There is no weak link here. Cropped shot of a group of unrecognizable businesspeople linking arms.

There is no weak link here. Cropped shot of a group of unrecognizable businesspeople linking arms.

$5
Strengths, Weaknesses, Opportunities, Threats analysis written note. SWOT Analysis.

Strengths, Weaknesses, Opportunities, Threats analysis written note. SWOT Analysis.

$6
Mature old and weak man recovering from coronavirus wearing hospital jacket

Mature old and weak man recovering from coronavirus wearing hospital jacket

$5
Mature old and weak man recovering from coronavirus wearing hospital jacket

Mature old and weak man recovering from coronavirus wearing hospital jacket

$5
Sick weak senior man feeling unwell drinking tea sitting on sofa

Sick weak senior man feeling unwell drinking tea sitting on sofa

$5
Brunette woman combing styling dry damaged weak hair on a white background.

Brunette woman combing styling dry damaged weak hair on a white background.

$5
black pawn won chess game, weak opponent defeated superior forces

black pawn won chess game, weak opponent defeated superior forces

by mypics
$5
Depressed woman lying alone on sofa feeling tired vulnerable weak crying

Depressed woman lying alone on sofa feeling tired vulnerable weak crying

$9
Mature old and weak man recovering from coronavirus wearing hospital jacket

Mature old and weak man recovering from coronavirus wearing hospital jacket

$5
Hypotonia in babies, muscle weakness. Acute pediatric inpatient rehabilitation for little male

Hypotonia in babies, muscle weakness. Acute pediatric inpatient rehabilitation for little male

$7
Depressed woman lying alone on sofa feeling tired vulnerable weak crying

Depressed woman lying alone on sofa feeling tired vulnerable weak crying

$9
Defense breakdown. The security system is hacked.

Defense breakdown. The security system is hacked.

by iLixe48
$5
Hacker arriving in secret base with laptop, ready to start programming viruses

Hacker arriving in secret base with laptop, ready to start programming viruses

$10
Close up shot of dangerous hacking code running on computer system monitors

Close up shot of dangerous hacking code running on computer system monitors

$10
Evil IT engineer using chroma key PC displays to build script tricking firewalls

Evil IT engineer using chroma key PC displays to build script tricking firewalls

$10
Cybercriminal uploading USB containing stolen information into green screen PC

Cybercriminal uploading USB containing stolen information into green screen PC

$10
A red man faints out from a row. Weak link. Out of order.

A red man faints out from a row. Weak link. Out of order.

by iLixe48
$5
Evil IT engineer using chroma key PC displays to build script tricking firewalls

Evil IT engineer using chroma key PC displays to build script tricking firewalls

$10
Two percentage scales of efficiency

Two percentage scales of efficiency

by iLixe48
$5
Breakdown of protection and collapse of the security system.

Breakdown of protection and collapse of the security system.

by iLixe48
$5
Defense breakdown. Destruction of protection.

Defense breakdown. Destruction of protection.

by iLixe48
$5
Protection from threats. Defense breakdown. Security system is hacked.

Protection from threats. Defense breakdown. Security system is hacked.

by iLixe48
$5
Hacker inserting USB stick in computer after managing to steal sensitive data

Hacker inserting USB stick in computer after managing to steal sensitive data

$10
Cybercriminal uploading USB containing stolen information into green screen PC

Cybercriminal uploading USB containing stolen information into green screen PC

$10
Extreme close up shot of hacking code running on computer system monitors

Extreme close up shot of hacking code running on computer system monitors

$10
Hacker building script able to trick firewalls, close up

Hacker building script able to trick firewalls, close up

$10
Leadership in Action: Japanese Woman Presenting SWOT Analysis

Leadership in Action: Japanese Woman Presenting SWOT Analysis

by baffos
$5
Rogue programmer successfully gaining access to victim data

Rogue programmer successfully gaining access to victim data

$10
Code running on monitors in empty apartment used by hacker stealing state secrets

Code running on monitors in empty apartment used by hacker stealing state secrets

$10
Scammer happy after obtaining sensitive information from users using malware

Scammer happy after obtaining sensitive information from users using malware

$10