Time is the most merciless adversary of the cybersecurity professional, especially with this hack.
A malicious actor would wait to hold onto invaluable info from a hack and never repeat the compromise process.
To defeat adversaries in the cyber domain, defeat their ability to incentivize others or limit the effectiveness of cyber actors.
A lack of analytical rigor for ID of true indicators may include total belief in a connection where none exists.
Look at prior choices to exempt all relevant stakeholders from the responsibility of addressing shortcomings until too late.