10.07.2015 Views

1E9Ct5D

1E9Ct5D

1E9Ct5D

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• The message contains no background information;• The sender provides no information on how they decided to contact you;• The message contains an immediate call to action or urgentcircumstances;• The message includes threats (“Act now or your account will be blocked”);• The email originates from a supposed foreign source; and• There are fake links in the email.2. The Internet is Brimming with Data Security Threats.The Internet is another top threat to data security. Popular websites may becompromised unbeknownst to the company or consumer. Consider, for example, thatyour chief engineer goes online to purchase his wife flowers for their anniversary. Thelocal florist’s website has been compromised (unbeknownst to the engineer, or theflorist) and up pops a notification from “Internet Explorer” that his version of the Internetneeds to be updated before he can proceed. By clicking on the box to proceed with the“update,” the engineer unknowingly downloads malware onto his company computer.3. The Insecurity in Unsecured Communications.Protected data can also become unprotected by eavesdropping, through capturingunsecured wired or wireless communications. A common example is public, hotel,airport, café, or convention center Wi-Fi. With public, unencrypted Wi-Fi, you’re neverMarch 6, 2015 7 © 3-6-2015 ALFA International Business Litigation P.G.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!