Protecting Data Against Viruses Company Term Paper

PAGES
2
WORDS
700
Cite

The owner remarked about how important it is to guard one's system against viruses and intrusion. He went further to remark that there are programs that offer their services free of charge (partial programs or trial versions) to protect one's computer, but he recommends buying a program that offers full protection. This statement concluded the interview "Unfortunately my customers have often learned the importance of protecting their information the hard way; it is not something to be taken lightly." This statement makes a lot of sense. Too often a person will sit back thinking that it is impossible for something to happen to them, when in fact one should always be prepared for the unexpected. The owner of Company Xtreme reported that approximately 50% of his customers are individuals whom have had viruses on there computer. Among this 50%, they also have spyware, which often may allow strangers access to ones private information without knowing it. Spy-ware may often get on one's computer through downloading programs,...

...

from the Internet. The owner also explained how important it is to know what one is downloading, as well as never to open attachments that are from people one does not know or are not expecting to receive. This was very important to know because he stated that there are viruses that can pose as mail from friends or known establishments with attachments for one to open. Then once the files are opened, one has all kinds of spy-ware and possible viruses on the computer that makes one's information vulnerable to hackers. Hackers are people whom make their life's work "breaking" into or "hacking" into one's computer to retrieve sensitive information. This information could be bank accounts, social security numbers, even something as simple as one's home address. So many things deserve consideration when dealing with important information and its security. This company certainly stressed the importance of keeping one's information secure, by using the proper software and precautions to stay safe.

Cite this Document:

"Protecting Data Against Viruses Company" (2005, August 06) Retrieved May 10, 2024, from
https://www.paperdue.com/essay/protecting-data-against-viruses-company-67089

"Protecting Data Against Viruses Company" 06 August 2005. Web.10 May. 2024. <
https://www.paperdue.com/essay/protecting-data-against-viruses-company-67089>

"Protecting Data Against Viruses Company", 06 August 2005, Accessed.10 May. 2024,
https://www.paperdue.com/essay/protecting-data-against-viruses-company-67089

Related Documents
Data Warehousing
PAGES 10 WORDS 2601

Data Warehousing Data Warehouse technology has changed the way that global organizations conduct business. Many have found it impossible to create a business strategy without a data warehouse. The purpose of this discussion is to research and explain the importance of data warehouse management. We will begin by defining data warehouse and describing the business uses for the technology. Our discussion will then focus of data warehouse management. We will examine the

Protecting People and Information: Threats and Safeguards In this contemporary era, we are living in a world that rotates around "Information Economy." This means that the wheels of the world no longer run predominantly on agricultural products or merchandise. The secret of surviving in the present days is the creation and propagation of information (Hill & Pemberton, 1995). Information is vital for the continuous functioning of every venture. Today, information has been

Tony Chips Independent Company Website Tony's Chips independent company Website Scenario Tony Chips has recently bought a new independent company and the company is interested to move its old Website from external hosted solution to internal web hosting. Meanwhile, the company management is concerned about the redundancy of the Website and insists that the Website should have a back up in case the original Website goes down. More importantly, the site will be

Future of Data Storage in Computer Networks There are a number of problems facing the future of information technology including the fact that networks are increasingly asked to expand in order to accommodate more and more data. Many experts believe that such increases will mean two things; one that the networks will become increasingly secure, and two because of the security, the data contained on the network will become more difficult

Remote access controls. Network security management. Password policies. Compliance with the policies and procedures of the company is very vital to the organization, and the policies and procedures should be clearly communicated to the appropriate business teams. Intruder: The suggested treatment for the attack by the external intruder such as hacker is to ensure that all communication within the organization is encrypted to deter the unauthorized access to the company data. Moreover, the organization

Exposing Your Data on the Internet While I do not know someone who has personally been violated by the process of data mining, I recognize the potential danger in the process of collecting data for purposes like marketing. On the surface, data mining is harmless. Organizations or interested individuals simply collect and sort through data. Usually the purpose of data mining is "to identify patterns and establish relationships," such as the