How can we prevent vulnerabilities to malware?
Penetration testing - find any risks or weaknesses and try to fix them
Firewall - manages incoming and outgoing network traffic. Each data packet is processed to check whether it should be given access to the network
Secure password - using a combination of special characters it makes it harder to the hacker to work out
Encryption - scrambling data into an unreadable format so the hacker cannot understand it