Investigate security issues related to technology.

Investigation should include research to identify threats to computer systems (e.g., spam, malicious software, theft) and the methods for guarding against such threats, including

  • malware protection software
  • firewalls
  • regular backups
  • password protection
  • data encryption
  • software updates
  • limiting access to devices and portable storage.