Has your company reached the point where all data protection strategies have been considered? A firewall deployed at the edge of the network? A transparent system against intruders? Encryption to protect all communication routes between networks and remote devices?
Have you ever clicked on any internet link and been directed to a website that was not “exactly” the address you intended?