Yeah, this attack sounds like that game you played when you were a kid. Monkey in the Middle. You and a friend toss a ball back and forth. And your little brother is jumping to intercept.
Don’t trust your company’s critical data and operations to just anyone! This business advisory guide will arm you with 21 Revealing Questions you should ask any computer consultant before giving them access to your network.