There are six commonly used technological methods to safeguard information systems: physical access restrictions, biometrics, virtual private networks, firewalls, encryption, and virus monitoring and prevention. Organizations also implement human safeguards like ethics, laws, computer forensics, and developing and following an information security plan that includes risk analysis, security policies and procedures, disaster recovery planning, and continuous management of security issues.