Respuesta :

Answer:

  1. Equip systems with strong user authentication passwords. ...
  2. Take ownership of encryption keys. ..
  3. Ensure proper use-policies for dated applications. ...
  4. Provide employee training on cybersecurity best practices.

Explanation:

hope it will help you have a great day bye and Mark brainlist if the answer is correct