Imagine you are an information security manager in a medium-sized