Consider your organization or another organization that has been  affected by a cyber-attack. Feel free to research current events on this  topic if you do not have personal experience with an organization who  has been affected by a cyber-attack. Once you have selected an  organization, answer the following questions: Provide a summary of the organization you have selected. What type of cyber-attack occurred? How did the attack occur? As a business manager, what are some recommendations you would  make to the organization, from a business perspective, to better defend  itself in the future? What steps can the business take to better support IT security? Explain. Embed course material concepts, principles, and theories, which require supporting citations along with at least two scholarly peer reviewed references supporting your answer. Use APA style guidelines. #button { background-color: #F05A1A; border: 5px; border-radius: 5px; color: white; padding: 5px 5px; text-align: center; text-decoration: none; display: inline-block; font-size: 13px; margin: 4px 2px; cursor: pointer; } Save your time – order a paper! Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines Order Paper Now You are required to reply to at least two peer discussion question  post answers to this weekly discussion question and/or your instructor’s  response to your posting. These post replies need to be substantial and  constructive in nature. They should add to the content of the post and  evaluate/analyze that post answer. Normal course dialogue doesn’t  fulfill these two peer replies but is expected throughout the course.  Answering all course questions is also required.   Required Chapter 5 in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability Altuntas, M., Berry-Stölzle, T. R., & Hoyt, R. E. (2020). Enterprise Risk Management Adoption and Managerial Incentives. Journal of Insurance Issues, 43(2),  1–42. Retrieved from  https://csuglobal.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=145969927&site=eds-live Öbrand, L., Holmström, J., & Newman, M. (2018). Navigating Rumsfeld’s quadrants: A performative perspective on IT risk management. Technology in Society, 53, 1-8.