We are living in a hyper-connected world today, and our first thoughts are that firewalls, antivirus software, and endpoint protection are the tools that keep us secure. However, the reality is that most breaches do not come through a code exploit, but rather through a talk, a call, an email, or a...