Breach of Internal Policies Breach of internal security rulesUse of “Tor” anonymizing networkPeer-to-peer connections with suspicious hostsBitcoin mining Do you have any question? Please leave us your contact details so we can deliver a personalized offer tailored to your company’s needs.