Remove CTO Remove Engineering Remove Finance Remove How To
article thumbnail

How Technical Debt Opens the Door to Cyber Attacks—and Steps to Protect Your Small Business

Strategy Driven

Let’s look at how that might happen and how to prevent it. Months of investigation by a cyber consulting firm finally determined the source of the vulnerability to Azotrope’s network: a combination printer/fax machine in their testing and QA area that engineers regularly used to fax lunch orders to a local Chinese restaurant.