One of the things I cover with clients is misconfiguration of systems – small businesses (and sometimes large) often think they know what they are doing and so set hardware and software without experience. One example of this is the amount of reconfiguration our team has to carry out on …
Continue reading “It is your mistakes that the opportunistic threat actor is waiting for.”