In my third essay looking at increase breaches of personal information through malware and questionable security practices, I will now take a look at existing computing systems. 1,543 more words