We are constantly being bombarded with questions around the security of our data, but what about security for the devices needed to connect to that data? The world is a changing place and for those inclined to be unsavoury characters, a great place to anonymously make ill-gotten gains from unsuspecting victims who thought they were doing due diligence with their base-model anti-malware and anti-virus programs. After multiple data breaches, we now realize that these solutions are weak.