Accessing Exposure The first step in securing your information is understanding where the vulnerabilities in your organisation lie. GETSTARTED