24 Sep current security threats
This discussion consists of 2 parts. Part 1 focuses on current security threats. Part 2 directs focus on securing mobile devices. Be sure to thoroughly respond to each bullet.
Part 1: Security Threats
Provide an example of at least one security threat. This can be an actual threat to an organization. It can be an example of a “what-if” scenario. Discuss at least one way that this threat could have been minimized or prevented.
Part 2: Mobile devices
Compare desktops to laptops, tablets, and smartphones using best practices related to security. Discuss the best practices that you use or plan to implement on your mobile device(s).
