Answer:
- Equip systems with strong user authentication passwords. ...
- Take ownership of encryption keys. ..
- Ensure proper use-policies for dated applications. ...
- Provide employee training on cybersecurity best practices.
Explanation:
hope it will help you have a great day bye and Mark brainlist if the answer is correct