At Closed Door Security, we were previously hired by an MSP to conduct an internal assessment of their network. The audit was carried out from an assumed breach standpoint where a malicious device was attached to the internal network by an ’employee’. Our testing led to the discovery that the network was vulnerable, and our