Many people in the IT industry accept incremental risk after incremental risk over time, author says. Most successful hacks occur due to multiple vulnerabilities, he says. A series of mistakes opens up the holes to the point where the hacker has an exploit superhighway once the first hurdle is cleared. Listing the accepted risks, then linking them to scenarios detailing how a bad guy would attack assets. For example, a short video shows how the risks could result in the most compelling compromise of high-value assets.”]
Source: https://www.csoonline.com/article/2931979/behind-every-major-breach-many-manageable-risks.html

