The Situation
A small business with fewer than 20 users relied on remote access and systems that were considered safe enough for day-to-day work.
Backups existed and were reporting normally, but no one had reviewed whether those backup systems could be targeted through the same access paths as production systems.