Once the OS for each computer is appropriately built, secured, and deployed, the process of maintaining security is continuous. This results from the constantly changing environment, the discovery of new vulnerabilities, and hence exposure to new threats. As an IT manager, how you would provide security maintenance in the long run? Write the steps.