On the first day of Cybersecurity, my IT team gave to me:
A patch for every vulnerability.

On the second day of Cybersecurity, my IT team gave to me:
Two-factor login,
And a patch for every vulnerability.

On the third day of Cybersecurity, my IT team gave to me:
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the fourth day of Cybersecurity, my IT team gave to me:
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the fifth day of Cybersecurity, my IT team gave to me:
Five phishing drills!
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the sixth day of Cybersecurity, my IT team gave to me:
Six backups running,
Five phishing drills!
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the seventh day of Cybersecurity, my IT team gave to me:
Seven vendors vetted,
Six backups running,
Five phishing drills!
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the eighth day of Cybersecurity, my IT team gave to me:
Eight files encrypted,
Seven vendors vetted,
Six backups running,
Five phishing drills!
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the ninth day of Cybersecurity, my IT team gave to me:
Nine admins limited,
Eight files encrypted,
Seven vendors vetted,
Six backups running,
Five phishing drills!
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the tenth day of Cybersecurity, my IT team gave to me:
Ten plans for testing,
Nine admins limited,
Eight files encrypted,
Seven vendors vetted,
Six backups running,
Five phishing drills!
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the eleventh day of Cybersecurity, my IT team gave to me:
Eleven alerts for phishing,
Ten plans for testing,
Nine admins limited,
Eight files encrypted,
Seven vendors vetted,
Six backups running,
Five phishing drills!
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

On the twelfth day of Cybersecurity, my IT team gave to me:
Twelve threat feeds streaming,
Eleven alerts for phishing,
Ten plans for testing,
Nine admins limited,
Eight files encrypted,
Seven vendors vetted,
Six backups running,
Five phishing drills!
Four VPN tunnels,
Three strong passwords,
Two-factor login,
And a patch for every vulnerability.

