Introduction Imagine a scenario wherein an organization exists by the name “Cyber Shield” that provides cybersecurity services to other businesses. Cyber Shield’s IT team uses MTTR to track the time it takes to remediate security incidents that occur in their clients’ systems. A client of Cyber Shield reports that they have been the victim of...