It is essential to know about the cyber security. It is only by getting to know more about the cyber-security that the organization would be in a position to prevent the threats that come with it. Without the knowledge, the organization stands at a risk of losing the crucial information to unauthorized people (Buczak & Guven 2016). Losing the information to the unauthorized people risks many aspects of the business. For instance, the information may fall into the hands of the competitors who may use it to the disadvantage of the organization. Again, the loss of the information may land the organizational in the hands of the defrauders. Many organizations continue to suffer losses due to the infringement of the internal affairs by the unauthorized people. It is therefore imperative that a company learns of the cyber security to be able to counter the cyber threats.Strategies for fighting cyber-security threats One of the information protection strategies that the organization ought to apply is offering training to the employees (Liu et al, 2015). This ought to be continuous to counter the new risks that arise on a daily basis. The lack of proper expertise exposes the employees to dangers of being lured to giving off confidential information.The other strategy that ought to be used is the data encryption. This involves the use of codes in passing information from one location to the other. Only the people that have the respective codes can be able to access the information. This works well in preventing the loss of information in transit.The information location ought to be limited to the authorized people only. In many cases, the loss of confidential information occurs due to the free access of the same by any of the employees. The free access makes it possible for a crook employee to as the information to other outsiders (Ball 2017). Therefore, the limitation of the computer access and inducement of passwords works well in protecting the information.ReferencesBall, K. M. (2017). African Union Convention on Cyber Security and Personal Data Protection. International Legal Materials, 56(1), 164-192.Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., & Liu, M. (2015, August). Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In USENIX Security Symposium (pp. 1009-1024).