Too Long; Didn't Read
Imagine your office <a href="https://hackernoon.com/tagged/network" target="_blank">network</a>. Cyber attackers are trying to get into it. They know that your company has lucrative proprietary data. They know that your company will be tempted to pay expensive cryptocurrency ransoms if they can cripple your computers with ransomware. Even if you keep good backups, <a href="https://www.cylance.com/en_us/blog/hospital-had-backups-paid-ransom.html" target="_blank">it might not be practical to restore from them</a>. Maybe the cyber attackers want money? Maybe they just want to vandalize your web servers “for the lulz?” Maybe an individual attacker won’t target your company, but profitable cyber attack botnets and services can be hired so easily from the Dark Web these days. Bots will travel all over the internet looking for vulnerable targets to hit. Your office network may be tagged “it.”