C – Combat cyber attacks
Y – Youthinize the older generation in to adapting to new technology
B – Back up critical files
E – Establish new programs or ideas
R – Record people stealing
S – Store personal information
E – Enter server data
C – Connect with employees on cybersecurity
U – Unify management on cybersecurity approaches
R – Recover lost data
I – Investigate attacks
T – Teach how to be safe online
Y – Yearn for new ways to stay safe online