Tech companies prepare for cyberattacks using common cybersecurity resources.

 

Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:  1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.

The initial post is due by Thursday 11:59 pm EST. At least two replies to other students are due by Sunday 11:59 pm EST.

Leave a Reply

Your email address will not be published. Required fields are marked *