Disucssion: "Security Breach"
Respond to the following:
• From the e-Activity, determine whether the breach could have been avoided without additional funds or technology. Explain why or why not.
• Describe one issue not mentioned in the textbook when using contracted security at an organization. Then, describe one issue not mentioned in the textbook when using proprietary security at an organization.