8 Ways “Group Enforcer” Can Knockout IT Cyber Security Threats