Everyone touching your network has to be authenticated, every application, every bit of data that comes in, you verify it... You just have to do a lot more to check,( including) multi-factor authentication, identity management, encryption.

More Quotes by Sowmyanarayan Sampath