Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified?
Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?