The series on cyberthreat protection continues. Last week’s episode looked at ransomware and phishing as attack vectors, but there are other ways that systems are threatened.