Browsing: It may come down to neutralization techniques

     A chain is only as strong as its weakest link. It is up to managers and supervisors to take responsibility for enforcing security protocols. When internet use became widespread in the late 1980s, a set of commonsense security rules were developed. The same principles still apply; however, today’s technologies are more sophisticated.