In three pages this paper considers what businesses can do to protect Internet security in the event of a computer attack. Three sources are cited in the bibliography.