Recommend one or two additional measures to secure file systems and access to the network, such as training, additional hardware or software, virus scanners, etc. For each measure you recommend, discuss its rationale and any threats that it would seek to mitigate. List and describe the vulnerabilities it might not address.