The key to protecting digital communication systems against fraud,hackers,identity theft,and other threats is _____.
A)using file-sharing services
B)hiring ethical employees
C)using prevention techniques like strong passwords
D)creating a well-funded IT department
E)minimizing turnover