This blog reviews how cybersecurity policies have evolved over the past 30 years, the most common causes of security breaches today, and why it's important to apply a "security screen" to all policy proposals. For more about this, please contact Virtual Office Solutions.