ABSTRACT
Information technology (IT) continues to grow and develop in complexity, and thus even small to
medium-sized firms have evolved into diverse, complex, and unique infrastructures. One size no longer
fits all, and what works in one environment does not necessarily work in another. So while the underlying
IT infrastructure becomes more challenging to maintain, the threats and vulnerabilities introduced
through today’s “blended” exploits and attacks also grows exponentially.