Deploying effective cybersecurity measures for your business today is a continuous, ongoing battle with cybercriminals; and cybercriminals, like conventional terrorists, have a built-in advantage. It’s asymmetric warfare – just as it only takes one suicide bomber to breach a physical perimeter, it only takes one response to a phishing email to get past conventional “perimeter-based” IT protections, and thereafter it becomes easy to roam through target networks and extract sensitive data.