. . . "New vulnerabilities were being exploited as businesses rapidly adopted emerging technologies such as virtualisation, social networking and cloud computing." . .