Business safety measures PDF

Title Business safety measures
Course Fundamentals of International Business Strategy
Institution University of Greenwich
Pages 2
File Size 83.7 KB
File Type PDF
Total Downloads 68
Total Views 148

Summary

Business safety measures...


Description

Describe the actions taken to reduce the risks to security.      

There are many ways for computers to catch different types of viruses and each virus affects businesses different and work at certain areas such as: Deleting data Blocking data Adjusting data Copying data Troublemaking the performance of computers or computer network Trojans There are many ways to avoid or to reduce these risks by having buying or downloading specific anti software’s. Trojans can go on PC, laptop, Mac, Tablets, and smart phones to prevent this from happening you have to your devices you have to download/install an effective anti-malware software. This is like protection against Trojans, an example of antimalware solution can be Kaspersky Anti- Virus to stop this and Kaspersky Internet Security for mobile phones like Android will offer world-class virus protection. Worms Worms is a virus that self- replicates itself on computer and computer network without the user or owner knowing this can being become very infected to your computer. Because the worm virus self-replicates itself this endures to replicate which feasts all over the computer. Since of this disturbance this can cause high levels of destruction. The worm virus can include the following IRC worm, P2P worm, Virus, Email worm, IM worm. The worm spreads very fast throughout you daily activates and its most likely to spread in the following ways: via link to web or FTP resources, via P2P (peer to peer) file sharing networks, and file send as email attachment. To prevent this from happening or to reduce this virus then you should install/download on all your all laptops, computers, macs, and smart phones an antimalware. This will give the user regular updates and information on what’s going on with your device. A good anti-malware is to use is Kaspersky anti-virus. Hackers Hackers are individuals or a group of people who uses computers, laptops to gain unauthorized access to data this is done by breaking through passwords or breaking through software’s etc. to prevent hackers hacking into your personal information/data you should already have a strong password for anything that requires it like social media accounts, access to computer, passwords should only remain to yourself or to someone you may trust, to have firewall in-between your computer, laptop and any other network and more importantly you should have an encrypt any sensitive information just in case anyone is trying to hack into your data and information this is makes everything more secure and safe. Spam Spams are emails that are mostly known as junk mails that are unwanted. These can also be known as unsolicited bunks emails. Spams aren’t one or two emails these are a large quantity or numerous amounts. To avoid spams entering your emails is by:

     

It gives its attention like opening them up buying anything from them, don’t reply to them, use disposal email address never reveal your email address on your website munging

Spyware Spyware is another virus and there are many different types of malicious software are being spread around the internet. A lot of people who have access and use the internet they aren’t aware of what they are and what they do. It’s important that people know what it is. Spyware has its own way of targeting certain areas like behaving in specific ways inappropriately without getting your consent this can happen on many occasions like advertising, gathering personal information, and changing the configuration of your computers. Spywares can be doing anything to your computer like slowing down or having equal chances of crashing. To avoid this from happening. Is to read all enclosure including license agreement and privacy statements. This will let the user know whether there is unwanted software included in the software installation....


Similar Free PDFs