A. It means realizing that your defenses will eventually be breached and putting a plan in place to recover from such a breach.
B. It means using endpoint devices with the highest level of monitoring and malware protection.
C. It means deploying security technologies that can protect you against both known and unknown malware.
D. It means building multiple layers of protection so that malware cannot penetrate your defenses.