Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.
Requirements: 200 to 300 words
Answer preview
Some of the areas I will stress would be emailed security policies, endpoint detection and response, and a robust detection control infrastructure. Emails are the primary malware entry point in computer systems (Bambauer, 2020). Having sophisticated defense mechanisms lockout malware and notify the control center of any attempt on the data breach. Having instant detection and diagnosis of data security threats enables a timely intervention, thus solving data loss. Data
[311 Words]