1.Organizations face many challenges when trying to combat malware and hacker attacks. Name and describe five policies that can help ward off these types of security issues.
2.How does disaster recovery planning differ from business continuity planning? Do organizations really need both?