New! H2O now has access to new and up-to-date cases via CourtListener and the Caselaw Access Project. Click here for more info.

Main Content

Cybersecurity 101: Three-Part Introductory Section

1.3.5 User-based Vulnerabilities

Some vulnerabilities do not rely on specific technical hacks, but simply on the susceptibility of individual users.