IT risk management relies on end-user and administrative compliance with the rules, regulations, and polices set up as a means of protecting information assets within the environment. Comprehension of the consequences and rewards of policy adherence is necessary if security professionals are expected to implement security, and risk management strategies that rely on the strength of policy management and distribution._x000D_
_x000D_
In a 750- to 1,250-word paper, evaluate the implications of Internet use (including, but not limited to, basic web presence, online shopping, vendor unique portals, vendor specific portals, “IOT,” social media, and/or VPN use) within a SMB, as well as data protection for intellectual property. Make sure to address third-party vendors, cloud technology, and technology trends._x000D_
_x000D_
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center._x000D_
_x000D_
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion._x000D_
_x000D_
You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. _x000D_
_x000D_
This benchmark assignment assesses the following programmatic competencies:_x000D_
_x000D_
MS Cybersecurity_x000D_
3.4: Evaluate the implications of Internet use within Small to Medium-Sized Business (SMB) and data protection for Intellectual Property.