Step-by-step explanation:
Tech companies focus on making advancement in technology products and services. They are driven by innovations and the use of technology to make them standout from other companies. They uses technology to render services.
Cyber attack is a deliberate attack on companies' computers or on an individual computer with the intention of stealing information, or other reasons without victim approval.
How policies on encryption could be implemented to prevent cyber attacks by:
Cyber security policies explain the guidelines on how organization staffs and end-users access online applications and internet resources without fear of security details being hacked.
1. Rules should be set on how to use email encryption: This rule should be easy to read. Emails should be encrypted to provide safety from cyber attacks. Contents should not be visible, should only be visible to those sending and receiving such emails.
2. Rules on encryption of sensitive messages and back up data.
3. rules on encryption of Log in details and passwords