In the previous installment of this series we discussed how to do a comprehensive vulnerability assessment to determine in which ways your church and its assets - from the building to data, finances, and staff - are at risk of attack. With this concluding chapter we...
