Following the flood of recent data breaches, many may be wondering how or why companies are still inadvertently allowing data to be compromised, despite the vast security measures available to them today. The truth is that many blackhats looking to enter a system identify insecure remote access. In fact, the Department of Homeland Security brief…