One data, without much relevance, can be the entry point for an attack. A name or an email can be the first evidence used to obtain access to your system.
It is important to remember that each uncontrolled data can be used against your organization.
BOTECH offers counter-intelligence services to collect and evaluate the information that can be found on the network.