It makes it vulnerable because it’s a vulnerability. But at the same time one device doesn’t cancel out every security protocol put in place like others are implying here.
This is why good security has many layers. You don’t just want a firewall, you want restricted access for each user depending on their role, and you want virtually isolated networks for each group of users etc.
Latest Answers