Discussion Post
Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:
• Monitoring and assessment,
• Policies and controls
• Hiring
• Software
• Firewalls
• Authentication and access
• Encryption.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.