· From the e-Activity, determine the key considerations for developing a customized security structure for the technology business that you researched. Include a brief description of the business.
e-Activity: Research the Internet or the Strayer Library for a technology business that seems like it would need funding from an equity source. Be prepared to discuss.