Part three of a three-part series on system access assessments Even with cybersecurity as a hot topic in recent years, hacking into your system might still be embarrassingly easy. How easy, you ask? This easy: Within minutes, an auditor we know was able to log into a coffee company’s huge IBM system. He discovered the […]