Discuss the below in detail
Q1. Describe the best practice to employ to mitigate malware effects on a machine.
Q2. Four academically reviewed articles on Cyber Security and Risk Management and complete the following activities:
Discuss the relationship between cyber security and risk management.
As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company.