Of course it takes more than two computer defenses to make a complete defense. You still face password-cracking hackers, SQL injections, XSS browser attacks, misconfiguration exploits, zero-day vulnerabilities, and so on. But all of those attack types, in aggregate, don't hold a candle to the main two problems. Solve them and you'll be a hero.
Sign up for CIO Asia eNewsletters.