"Today's state-of-the-art network security appliances do a great job of keeping the cyber monsters from invading your business. But what do you do when the monster is actually inside the security perimeter? Unfortunately, all of the crosses, garlic, wooden stakes, and silver bullets in the world have little effect on today's most nefarious cyber creatures" (Manky, 2010). Review the Office Security Violations media and identify at least 10 security violations. For each violation, describe a remediation strategy. As the auditor, develop an e-mail for the director of this facility and include the violations as well as the remediation strategies along with a date for a second audit. expanding on the identified violations and strategies in their initial posts.