Tip No. 11 – Be flexible
We know how vulnerabilities are generally classified; that is, in a standard way by the cybersecurity industry.
For example, a critical vulnerability such as a remote code execution (RCE) would have a high impact. It would be critical, as we said previously, but if to exploit the vulnerability it is necessary to access an application with a VPN, the risk is considerably reduced. This could go from critical to high risk.