ACTIONS TO BE TAKEN
Hackers would always choose to attack the most vulnerable link, and for many firms this would most likely be their applications. Other inclusions for links that are the weakest are the processes, the people, and the infrastructure, all of which are a part of the technology architecture. By making use of other techniques of testing such as risk reviews, infrastructure tests, and penetration testing a firm can get a comprehensive view into its most sensitive links and shift their focus on them accordingly. Eventually, the only requirement is to get data that as ready and close as is possible. In this generation, this is usually the case with our mobile phones and hence the applications are required to give out more information to the consumers through this medium.