(Source: Security Boulevard) A key rule in security is that you can only secure what you can see. … but virtual servers, wireless access points, VoIP boxes, mobile phones,…