Discussion Post
Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:
• monitoring and assessment,
• policies and controls,
• hiring,
• software,
• firewalls,
• authentication and access,
• encryption.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.