Many cyber incidents do not start with advanced hacking tools or complex vulnerabilities. They begin with systems that are left just ...