In five pages this paper examines how companies can protect computers from viruses, hackers, or natural disasters. Six sources are listed in the bibliography.