8 Ways “Group Requester” Can Knockout IT Cyber Security Threats