+1-316-444-1378

paper discussing the steps an organization should take to defend against whaling attacks? Define what a whaling attack is and discuss your suggested defenses against whaling attacks and which are different from defenses that you would suggest for phishing and spear phishing attacks.
1) Title page, a separate Reference page,The appropriate In-Text citations for the material presented
NOTE English is my second language so do not use words that probably I would not know.