C – Creating apps that rate security software
Y – Yacht GPS software that is secure
B – Blocking hackers and other threats with a firewall
E – Encrypting sensitive data
R – Ransomware detection
S – Spoofing attack defense
E – Ethical hacking to find vulnerabilities
C – Cryptojacking defense
U – Use good teaching methods to train less aware employees
R – Rank other businesses or organizations cyber security practices
I – Implementing Information technology defensive systems
T – Two-Factor authentication implementation
Y – Yearly employee security tests