As many as possible that satisfies our cybersecurity requirements. The reason why is that the more heterogeneous, more plural our configuration is, the less likely that all of them will be taken over at the same time.

Keyboard shortcuts

j previous speech k next speech