Part 4 In the previous three articles we highlighted the challenges organisations currently face in dealing with the complexities of keeping your IT endpoint devices secure. “83% of breaches are misconfiguration mistakes” Misconfigurations and humans drive incidents not sophisticated hackers.