Question of Liability: Critique of the Cyber-attack on TargetNameAffiliationDateTarget’s Current Cybersecurity ProtocolsFollowing the 2013 data breach, Target has invested in building a long-term strategy aimed at protecting the company’s entire business enterprise against cyber-attacks (Pigni et al, 2018). The company now employs a world-class team of cybersecurity experts who work around the clock to ensure that the company is protected from all kinds of cyber-attacks. The cybersecurity team uses some of the best technology available on the market to counter any cyber threats that target the company’s network and its data. The company also collaborates with other companies in the industry on cybersecurity which has helped the industry stay ahead of emerging cyber threats. After the 2013 attack, Target has gone ahead to build its team and capabilities. Since the attack, the company’s cybersecurity team has been working tirelessly to build a resilient and adaptable security system that is capable of fending off any cyber-attack from the enemy. The company has also more than doubled its cybersecurity team after the 2013 data breach (Krebs, 2015). This was aimed at expanding the company’s cybersecurity network and ensuring