Explain,Does the network structure influence the traffic of data bring the challenge of data traffic when all the employees are using the network?

Does the network structure influence the traffic of data bring the challenge of data traffic when all the employees are using the network?
What are security measures that are implemented into the network to ensure that the network is safe from cyber-attacks? Is there an incident where the security measures were breached, and the attackers accessed the data of the company?
What action has the company taken to secure its data and whether the employees are knowledgeable and practice the data protection policy of the company? Do the employees get any kind of training to ensure that their actions do not compromise the security of the company?
What measures has the company taken to ensure continuity of operations in case the company is attacked and its data compromised? What is the extent of loss did the company incur when it was attacked and its data compromised?
Does the company have a security policy to ensure the security measures are adhered to by all the employees and what period of time is taken to review and update the policy
Are the employees aware of the security risks that exist, and what action has been taken to mitigate the risks?
What are the measures taken to ensure the critical system that the company uses is not compromised, and what are the potential risks that the system risks being compromised with?
When the company was attacked, what data was compromised, and how did the company recover from the attack? Did the company incur a financial loss from the attack?
How often does is the security infrastructure upgraded to ensure the security protocols are up to date with the modern threats that keep on changing and advancing with time? Does the company have the right professionals qualified to do the work of updating the security measures?
What is the backup plan for the company to ensure continuity even when the company has been attacked and its data compromised? Has the company backed up its data to use as an alternative once the company has been compromised?