“Mitigating Attacks” Please respond to the following:We?ve been talking about the various forms of attacks that malicious hackers can use to compromise security this week. Do a search on the Internet for an article about a recent (Within the past 4-6 months) attack. What method did the hackers use? Was it a sophisticated attack, or more amateur in nature? Now that you?re learning about attacks and how to mitigate them, what recommendations would you have to your leadership at your company if this attack had happened on your watch? What steps would you take to protect your data personally?