outline a security breach or cyberattack

 Find an article on the internet outline a security breach or cyberattack. Provide a link to the article and suggest a “control that would mitigate against that attack”. Clearly explain why that control would be an effective mitigation strategy.