Description: Research the internet for an example of a violation of sensitive information (data breach). Post a summary of the situation and outcome (as well as the source) and evaluate if controls were adequate to prevent the violation. What would you have done to protect the organization from this type of exposure in the future?
Response Guideline:
Please pick two posts to respond. Do you agree with their statements or disagree and why? Are there other controls they did not add?
You are expected to post a minimal of 3 posts per discussion question; the first response will be your initial answer to the discussion question (minimum of 200 word response).