5.3.2 Explain how a range of solutions are used to help keep data safe from security threats
Including:
access levels
anti-malware, including anti-virus and anti-spyware
authentication (username and password, biometrics, two-step verification)
automating software updates
checking the spelling and tone of communications
checking the URL attached to a link
firewalls
privacy settings
proxy-servers
secure socket layer (SSL) security protocol