Given the rapidly evolving technological landscape and the fact that adoption of software is ever increasing across various sectors including finance, government, military, retail, hospitals, education, energy to name a few, more and more information is becoming digital and accessible through wireless and wired digital communication networks and across the omnipresent internet. All this highly sensitive information is of a great value to criminals and evil doers which is why it is important to protect it using a strong cyber security measures and processes. The importance of good cyber security strategies is evident in the recent high-profile security breaches of organizations such as Equifax, Yahoo, and the U.S. Securities and Exchange Commission (SEC), who lost extremely sensitive user information that caused irreparable damage to both their finances and reputation. And as the trend suggests, the rate of cyber-attacks show no sign of slowing down. Companies, both large and small, are targeted everyday by attackers to obtain sensitive information or cause disruption of services. The same evolving technological landscape also poses challenges in implementing effective cyber security strategies. Software constantly changes when its updated and modified which introduces new issues and vulnerabilities and opens it up for various cyber-attacks. Furthermore, IT infrastructure evolves as well with many of the companies already migrating their on-premise systems to the cloud which introduces a whole new set of design and implementation issues resulting in a new category of vulnerabilities. Companies are unaware of the various risks within their IT infrastructure and hence fail to have any cyber security countermeasures in place until it’s far too late.