After reading a growing number of articles in the news recently about companies that have had their data hacked, I decided I should ask my own technical staff about our vulnerability. I wanted to know how well we could withstand the threat of an outsider or even an internal breach.

Having the question posed, our staff proceeded to provide a detailed description of the variety of firewall, encryption, aged passwords and log-in authentications that occur every time someone connects to our data network.

(**Mike, the previous sentence is probably the problem one – it doesn’t actually make much sense, even though it’s somewhat clear what he meant)

This was richly supported with a list of diagrams, system specifications and assertions that we were complying with all the industry standards. All very impressive. After an hour of questions and qualified responses, I asked one question that brought silence to the room — “How do we know we’re secure?”