I think one aspect we really look at is how to layer in multiple levels of cybersecurity. From my perspective, every piece of technology has some level of vulnerability. We really look to offset that. If one product doesn't work the way you expect, how do you layer it in?
I'll use the example of my work device here, which is connected over VPN. We use encryption to protect the confidentiality of the work that's being done. We've done operating system hardening, so we've turned off a lot of features. I can't install different software. I can't bypass our security controls. Even if, for example, somebody manages to put the alligator clips, to use an old term, on the lines, they can't read anything I'm doing. The encryption is protecting it.
It's about layering security so that you're not dependent on just one thing to protect yourself.