None of the agencies we tested had appropriate systems or processes in place to detect or respond to a cyber attack. Figure 2 summarises the access we achieved with our attacks. It illustrates the serious weaknesses in computer security at the agencies we tested.