The internet creates a lot of opportunities to harm and exploit other people on a different level since the internet has expanded in an extraordinary amount. Criminals are able to target people entirely  through the internet or use the internet to find the personal information of people they may be trying to stalk or harass in real life. Especially on social media, people tend to post a bunch of personal information without even knowing it’s putting them in harm’s way that offenders may use against you. It is like when people go on vacation and post about it, which just gives the criminal an incentive that you are not home so your house is empty and gives them motive to rob the house. Another way the internet sets up people to be victimized is by sharing something that was supposed to be private on a public form, shared without consent, or even used to blackmail. Something that’s even more crazy is the scams that are on all social media sites criminals have made it their job to just work online to look for easy breaches against people that have no idea they have been breached. Hackers now also hack webcams and microphones one people’s devices of all sorts. The best way to approach cyber policies is first to set up password requirements and then outline email security measures. You would also need to explain how to handle sensitive data and how you want to protect it and store it. Next in the process is to Set rules around handling technology, then how to set standards for social media and internet access, and especially this one you have to prepare for an incident which could be a breach or anything in that field. Most important part is making sure the policies stay updated.