Network weaknesses are like holes in a fence – eventually something is going to get through. This entry will look at how hacking groups were able to take advantage of general weaknesses in outdated systems and gain access to a rural dam and a network of hospitals in the DC-metro area Continue reading