1. Identify the threats and risks information technology poses on businesses
2. Describe the ways in which businesses protect themselves from the threats and risks information technology poses
3. What metrics should be used for evaluating the total rewards program and share why you chose the ones you did.