Our laptops, desktops and phones, our businesses, data, emails, our access to internet information and services—really, anything digital that traverses cyberspace and passes through a computer server—are all dependent on support and protection from security companies whose staffing and software are sometimes imperfect.