John Shier joins Jim Blasingame to discuss examples of how an unlikely vendor became the weak link connection that contributed to a major cyber-breach.