This page contains a Flash digital edition of a book.
Phishing Attacks


Phishing masquerades as a legitimate email or website that requests personally identifiable infor- mation, like bank account information. When this information is entered, cybercriminals collect the data and either use it for their own purposes or sell it on the underground market.


Tips Know the online policies of your online account provider. Banks, credit providers and other ser- vices will never ask you to confirm your personal details via email.


Make sure the URL of the site linked in the mes- sage matches the name of the company it pur- ports to be from. For example, “AcmeMetroBank. com” is not the same as “my.acme.metro.bank. com.”


Never click on a link within an email, IM or social networking site. Instead, type the address into your browser.


Firewall


A firewall is a software or hardware program that provides a first line of defense preventing unau- thorized users from accessing your computer or network. Without one, your computer is exposed to any computer connected to the Internet, which can invite malware, hackers and other unwanted intrusions.


Tip It is never necessary to disable your firewall when performing a download, install, or other online transaction. Choose a modern firewall from a trusted vendor such as Norton that automatically allows access to legitimate applications, while blocking everything else.


“The pressures facing small businesses are huge – taxes, payroll, hiring, marketing, just to name a few,” said Krysten Thompson, director of busi- ness development at Norton (smallbusiness.nor- ton.com), a maker of leading consumer Internet security products. “When it comes to technology that supports critical business operations, easy- to-use security software from companies such as Norton by Symantec is the way to go because they allow business owners to set it and forget it.”. W


10 Connect and Grow With Women In Our Community


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36