How Technical Debt Opens the Door to Cyber Attacks—and Steps to Protect Your Small Business
Strategy Driven
SEPTEMBER 1, 2020
Months of investigation by a cyber consulting firm finally determined the source of the vulnerability to Azotrope’s network: a combination printer/fax machine in their testing and QA area that engineers regularly used to fax lunch orders to a local Chinese restaurant. How would your CFO or CIO handle this? An excerpt is below.
Let's personalize your content