"Today's state-of-the-art network security appliances do a greatjob of keeping the cyber monsters from invading your business. Butwhat do you do when the monster is actually inside the securityperimeter? Unfortunately, all of the crosses, garlic, woodenstakes, and silver bullets in the world have little effect ontoday's most nefarious cyber creatures" (Manky, 2010). Review theOffice Security Violations media and identify at least 10 securityviolations. For each violation, describe a remediation strategy. Asthe auditor, develop an e-mail for the director of this facilityand include the violations as well as the remediation strategiesalong with a date for a second audit. expanding on the identifiedviolations and strategies in their initial posts.