When we enter organizations to examine the state of their infrastructure and information security, we repeatedly identify the same starting point: a high sense of security, which is not always based on a true picture of the situation. The systems are active, users are connected, and routine work continues as usual. On the surface, everything looks fine. […]





