We have discussed how systems are at risk and how the main threat to systems is people. If you had to review your personal computer for risks, where would you start? Why? What are some ways you could prevent cybersecurity breaches to your computer?
Your journal entry must be at least 200 words. No references or citations are necessary.