Everyday life relies on software to keep going, a phenomenon that is perhaps most visible in the business environment. Unfortunately, it is this software that can prove to be the point of egress that attackers need to your network. Let’s consider a commonly overlooked...








