Security Basics What steps can be taken to overcome security issues in a computer or mobile device, such as a virus threat or malicious e-mail attachments? In your response, discuss the following: Why should users be concerned about the security of their personal data stored on their personal computer, mobile device, or some company computer system? What is your preferred method of authentication? Why? Why do you believe that the method you chose is the safest when logging into a computer or mobile device? Looking for the best essay writer? Click below to have a customized paper written as per your requirements.