In the modern enterprise, IT staff must deal with the risks involved when employees bring their own devices and use them to access the company’s WLAN, which creates leakage into the main LAN. Many small- to medium-sized businesses allow BYOD and WLAN traffic to access the same resources on a LAN as the authorized internal clients. How might this common practice jeopardize larger companies that employ smaller companies as contractors and why? Have there been any recent breaches of large corporations using a contractor’s insecure infrastructure? In what manner was the smaller company’s insecure practices leveraged to breach the larger company?