These are the sources and citations used to research IT 552 Module Eight Assignment. This bibliography was generated on Cite This For Me on
In-text: (CYBERSECURITY BASICS, 2022)
Your Bibliography: 2022. CYBERSECURITY BASICS. [ebook] FTC.gov/SmallBusiness. Available at: <https://www.ftc.gov/system/files/attachments/cybersecurity-small-business/cybersecuirty_sb_factsheets_all.pdf> [Accessed 15 May 2022].
In-text: (How to Protect your Data if a Laptop is Lost or Stolen - Absolute Blog | The Leader in Endpoint Visibility and Control - Absolute Blog | The Leader in Endpoint Visibility and Control, 2022)
Your Bibliography: Absolute Blog | The Leader in Endpoint Visibility and Control. 2022. How to Protect your Data if a Laptop is Lost or Stolen - Absolute Blog | The Leader in Endpoint Visibility and Control - Absolute Blog | The Leader in Endpoint Visibility and Control. [online] Available at: <https://www.absolute.com/blog/how-to-protect-your-data-if-a-laptop-is-lost-or-stolen/> [Accessed 15 May 2022].
In-text: (Data Breaches and HIPAA, 2022)
Your Bibliography: SGR Law. 2022. Data Breaches and HIPAA. [online] Available at: <https://sgrlaw.com/ttl-articles/data-breaches-hipaa/> [Accessed 15 May 2022].
10,587 students joined last month!