Discussion: Information Governance
1. What do we mean when we say Cybersecurity?
2. What is Cybersecurity threat?
3. Why we need to implement methods and procedures to protect our personal information from Cyber-attacks?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.