the system administrators can block those activities (Byrne & Marx
2017). Another technology is hardware authentication. This technology covers the inadequacies of usernames and passwords. Data loss prevention also manages threats in an organization. Encryption and tokenization can inhibit data loss by computer-generated attackers. Supplementary
Cloud keeps information safe by inhibiting impostors who may want to snip or alter it.