Section Two: Strategies
Examine techniques utilized to protect potential targets of cyber crime.
Recommend an integrated set of strategies to combat the threat of cyber crime and protect the nation’s computers and the public.The full-text version of this article can be accessed through the General One File database in the UAGC Library. This article explores the increasing external threats that companies may face from outside cyber attacks.
Robb, D. (2014). Could HR Be the Next Target? HR Magazine, 59(7), 50-53.