Outline how businesses have protected themselves from cybersecurity threats, and