Determine effective cyber security methods for protecting a company.
Examples: password requirements, encryption, building security