In your brief overview of computer architecture and digital security, what are your own thoughts and processes in protecting your own digital security? Do you utilize software and services to protect your digital information? If not what policies do you set for yourself? In what ways do you see needed improvement?