Whenever we first engage with organisations to help them optimise their cyber security posture, they’re often surprised at the number of hidden attack vectors that need to be given careful consideration. While the fundamentals of cyber best practice are well-documented at this point, new threats are constantly emerging, which means...