From vulnerable to vigilant: Our cybersecurity transformation Eight years ago, our systems were a hacker’s dream. With no budget and legacy tech, we faced an uphill battle. Here’s how we turned weakness into resilience, one step at a time