Techgenics’ Data Security Compliance
“This is bad, really bad,” Jay Santos thought to himself. An email from Microsoft greeted him first thing in the morning with news of several new vulnerabilities, many that the software manufacturer had rated as critical. What troubled Jay was that the vulnerable software subsystem was the remote desktop protocol (see Exhibit 1). The use …