1.8 Current threat status and making possible recommendations based on cybersecurity Findings