re: #383 Obdicut
Not to mention that, in many ways, ‘sharing information with each other’ is a big cybersecurity no-no.
Let’s face it, no matter how rock-hard (hello ladies) we make a network against intrusion from the outside, some VP will use a thumbdrive that was mailed to him, or will install something from an email that says “From the IT department”.
Social engineering can hack any system.
Step one to securing a network; remove all the users.