When it comes to cyber security architecture, you really are only as strongest as your weakest […]