Spangler recognized the need to keep up with protecting their computer networks, devices, and data from unauthorized access or criminal use, and with ensuring confidentiality, integrity, and availability of information to their employees and customers. The company needed an assessment of their current cybersecurity protocols, along with