163 KB | 3 files | DOC, PDF
These guidelines will help you avoid the swarm of e-mail scams and threats out there, including phishing and identity theft schemes. It's a jungle out there; take every precaution.
E-mail provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch operations to phishing schemes using a combination of email and bogus web sites to trick victims into divulging sensitive information. To protect yourself from these scams, you should understand what they are, what they look like, how they work, and what you can do to avoid them. The following guide gives recommendations on how you can minimize your chances of falling victim to an e-mail scam.
The attached Zip file includes:
Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification.... More >>
Determine if data encryption is a fit for the company's critical information.... More >>
Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques.... More >>