POSSIBLE THREATS AND HOW TO AVOID ATTACKS

¡Supera tus tareas y exámenes ahora con Quizwiz!

COMPUTER VIRUSES

A computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user.

How to avoid PHISHING

Antivirus solutions with identity theft protection can be "taught" to recognize phishing threats in fractions of a second.

BYOD RISKS stand for

Bring-your-own-device (BYOD)

How to avoid COMPUTER VIRUSES

Carefully evaluating free software, downloads from peer-to-peer file sharing sites, and emails from unknown senders are crucial to avoiding viruses. The single most-effective way of fending off viruses is up-to-date antiviruses software from a reputable provider.

UNSECURED NETWORKS

From cafes to airports, hotels and other areas, plugging tablets into public Wi-Fi hotspots may be convenient for on-the-go employees, but it's also one of the easiest ways to give cyber criminals access to sensitive data.

HACKERS AND PREDATORS

Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism.

How to avoid SPYWARE THREATS

If a company you don't recognize is advertising for a deal that seems too good to be true, be sure you have an internet security solution in place and click with caution.

How to avoid/deal with: BYOD

Make sure to implement and enforce an effective BYOD policy. Privacy and how the company can access and monitor employee devices for security purposes. Keep all business data completely separate from the rest of the device.

How to avoid HACKERS AND PREDATORS

Online security tools with identity theft protection are one of the most effective ways to protect yourself from this brand of cybercriminal.

PHISHING

Phishing attacks are some of the most successful methods for cyber criminals looking to pull off a data breach. Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages.

SPYWARE THREATS

Spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information.

How to avoid: UNSECURED NETWORKS

The best way to protect employee tablets is by installing a virtual private network (VPN use a carrier-based, paid Wi-Fi hotspot, Instruct employees to ensure that the websites they visit and where they enter private information use Secure Socket Layer (SSL),

How to avoid DATA LOSS

The simplest way to prevent data loss is to back up data frequently and automatically. One way to do so is by using a third-party cloud storage solution, such as Dropbox, Box, Google Drive or OneDrive.

DATA LOSS

This could mean hackers doing anything from stealing data in the background to locking you out of your device or network systems.

IMPORTANTS UNSECURED NETWORKS

Wi-Fi side-jacking — the use of Internet tracking technologies to capture in-transit data, such as email and other login information, via wireless networks.


Conjuntos de estudio relacionados

Unit 2: Establishing Relationships in New Mexico

View Set

Taylor Practice Questions - Nursing Theory and Evidence Based Practice

View Set

CITI: Belmont Report and Its Principles

View Set

AGRI 21: SLAUGHTER, PROCESSING, AND MARKETING OF FARM ANIMALS

View Set

Biology: Chapter 4 (A Tour of the Cell)

View Set

Business Administration Exam Master Quizlet

View Set

Chapter 2 - Strategy: The Totality of Decisions

View Set