Identity is vital to halting these five cyber security assaults Some sections of this write-up are sourced from: www.itpro.co.uk