Part three of a three-part series on system access assessments
Even with cybersecurity as a hot topic in recent years, hacking into your system might still be embarrassingly easy. How easy, you ask?
This easy: Within minutes, an auditor we know was able to log into a coffee company’s huge IBM system.
He discovered the security problem while […]