Find an article on the Internet outline a security breach or cyber attack. Provide a link to the article and suggest a control that would mitigate against that attack. Clearly explain why that control would be an effective mitigation strategy. 300 words