Verified Document

How Hackers Defeat Computer Security Systems Essay

Critical Information Literacy: Tools for Coursework

Today, cyberattacks are disrupting and even destroying the computer operations of countless business of all sizes and types, and hackers appear capable of overcoming the latest protections that are available. Fortunately, there are some steps that business practitioners can take to protect their computer files from cyberattacks. To learn more about these, the purpose of this paper is to provide a review of selected resources to describe the importance of cybersecurity in the workplace and the respective benefits of regularly updating applications, of password control and virtual private networks.

Cybersecurity in the Workplace

Many people may not realize just how insidious some types of attacks on their computer security may be, and it is easy to fall into a hackers trap through clever social engineering tactics (How to avoid social engineering attacks, 2016). In particular, social engineering tactics use ordinary emails to phish for sensitive or proprietary information, including passwords, account numbers or other security-related data using email attachments, ads or fake Web sites that are routinely used which are designed to resemble the legitimate version. Cybersecurity specialists recommend never sharing any personal information through emails unless...

Indeed, the research showed that social engineering practices in particular represent an ongoing threat to computer security and users may be duped into sharing sensitive data without ever knowing it. In the final analysis, it is reasonable to conclude that maintaining computer security is everyones responsibility.

References

Google Help. (2016, September 14). How to avoid social engineering attacks [Video file]. Retrieved from https://youtu.be/XEtvwzN_xJk.

Oxen Technology. (2018, June 11). Basic cybersecurity tips for the workplace. Retrieved from https://oxen.tech/blog/basic-cybersecurity-tips-workplace/.

Rosenblatt, S., & Cipriani, J. (2015, June 15). Two-factor authentication: What you need to know (FAQ). Cnet. Retrieved from https://www.cnet.com/news/privacy/two-factor-authentication-what-you-need-to-know-faq/

Pilette, C. (2021). Symantec Corporation. What is social…

Sources used in this document:

References

-Oxen Technology. (2018, June 11). Basic cybersecurity tips for the workplace.

-Rosenblatt, S., & Cipriani, J. (2015, June 15). Two-factor authentication: What you need to know (FAQ). Cnet.

-Symantec Corporation. (2019). What is social engineering? Tips to help avoid becoming a victim.

Using the resources provided in this above, compose a brief assignment (500 to 800 words, approximately 2 to 3 pages) about cybersecurity in the workplace.

*What are the benefits of regularly updating applications (apps), of password control, and of VPNs?Credit all sources you used to complete your assignment. You will not be graded in this assignment on the details of citation style, but it is important that you indicate to the best of your ability when you have used information from an outside source.

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now