Scenario You have been approached by a non-profit environmental organisation seeking a comprehensive security assessment of its IT infrastructure. The organisation frequently handles sensitive information from whistle-blowers and leads major environmental campaigns. The organisation has observed unusual and suspicious activity within its network and systems, raising concerns about potential security vulnerabilities. While the exact weaknesses are unknown, there is a strong suspicion that the systems […]




