HOW TO REDUCE RISK? P4
There is a lot of risk when using the internet
for business-related activities. When the company has physical premises, they
have a threat to be solved. However, when they use the internet there are some
risks they need to be careful
CHECKING BEFORE DOWNLOADING EMAILS:
There are some annoying issues when online, especially when receiving
spam mail. Spam mail is another word for junk mail, it is an accidental mail,
but it can be blocked all spam mail if install a filling on the email account.
Another annoying issue that must be faced by online businesses is spyware. This
software is an aggressive commercial and will continue to try different methods
to get to their computer. Once it's on the computer, it will start to try and
sell the stuff or it can steal passwords and card details
- To reduce the risk just to to internet options > tools >
security options, make sure it is switched to medium or high security. Adware
is another issue that can happen, this is an annoying advertisement and
spyware. Also scams can happen, for instance phishing. This is where people
pretend to be organizations, such as banks, and request personal details from
customers. Newer and more recent browsers have anti-phishing scanning features
that reduce and limit phishing
BACKING UP DATA:
- E-business
is always vulnerable to security breaches. Any business, in question, security
breaches such as wrong access to other people's information, transferring fake
money, damaging data and malicious attacks can occur in various ways. Some
external threats, but some are internal
- To reduce the risk of data loss is to restore all data. Businesses
that use the intranet will have a lot of important and personal data, perfect
for hackers to hack that can harm the organization. By coping separate data and
storing it in safe where no one can access it will be the best option to hide
data and reduce the risk of losing it
SETTING UP PASSWORDS:
Many security issues do not
occur from external sources, but however, occur from the inexperienced people's
knowledge. The purpose of internal access is to obtain information from the
database, access any research data, view sales reports and also view marketing
statistics or human resource records. Information is valuable to people
especially when they can sell the information
A password called root password
is the primary access point for access to the primary system. Trusted employees
will have full rights to change whatever they like on the system. If a password
is given to a person, it means the person whose manager may not want to know
the password may have access to the system
To minimize the chances of
employees losing access to the system, managers need to 100% trust the person
they give the password. These are usually workers who are higher than the
business stairs and may be there longer with the same company which means they
let them change the correct data
TAKING PRECAUTIONS OVER SECURITY OF DATA:
Periodically check passwords and security
queries. Phishing is a misleading consumer practice that they will
inadvertently provide personal information to hackers. This tactic played an
important role in recent photo leakages. Phishing can happen with fake login
pages, spam email links, duplicate online surveys and even over phones
- Another way to reduce the risk is always to take precautionary measures when using the internet such as avoiding unusual link clicks especially in email. Clicking on an unfamiliar link can result in fraud and malicious fraud can take over any information may also be a link to download malicious files as Trojan virus or malware
- Another way to reduce the risk is always to take precautionary measures when using the internet such as avoiding unusual link clicks especially in email. Clicking on an unfamiliar link can result in fraud and malicious fraud can take over any information may also be a link to download malicious files as Trojan virus or malware
Comments
Post a Comment