Discussion
Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: i. monitoring and assessment, ii. policies and controls, iii. hiring, iv. software, v. firewalls, vi. authentication and access, vii. encryption.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.