Remove CIO Remove CTO Remove Engineering Remove Outsourcing
article thumbnail

How Technical Debt Opens the Door to Cyber Attacks—and Steps to Protect Your Small Business

Strategy Driven

Months of investigation by a cyber consulting firm finally determined the source of the vulnerability to Azotrope’s network: a combination printer/fax machine in their testing and QA area that engineers regularly used to fax lunch orders to a local Chinese restaurant. How would your CFO or CIO handle this? An excerpt is below.