Assume you are a security awareness trainer. Part of your job is to convince end users that paying attention to security procedures makes the entire organization more successful.
When a user does not follow security procedures, what are two consequences to the organization you would emphasize? Why?
Note: Please write in about 250 words in APA format with in-text citations and reference atleast two scholarly articles.
USEFUL NOTES FOR:
When a user does not follow security procedures, what are two consequences to the organization you would emphasize? Why?
Introduction
When users do not follow security procedures, they can expose the organization to various risks. There are two consequences that need to be emphasized in this situation: viruses, worms and Trojan horses can spread through a network by e-mail or by inserting your removable media such as a flash drive into an infected computer. Without proper procedures and restrictions to limit access to accounting files, medical records, employee files and other sensitive data, hackers could destroy all the data on the network. Social engineering is the process of gaining access through trickery such as pretending to be someone else because of this general lack of security awareness among users social engineers may be able to exploit user naïveté with plausible lies
Viruses, worms and Trojan horses can spread through a network by e-mail or by inserting your removable media such as a flash drive into an infected computer. Without proper procedures and restrictions to limit access to accounting files, medical records, employee files and other sensitive data, hackers could destroy all the data on the network.
Oops! Click Regenerate Content below to try generating this section again.
Social engineering is the process of gaining access through trickery, such as pretending to be someone else. Because of this general lack of security awareness among users, social engineers may be able to exploit user naïveté with plausible lies.
Social engineering is the process of gaining access through trickery, such as pretending to be someone else. Because of this general lack of security awareness among users, social engineers may be able to exploit user naïveté with plausible lies. For example, a phishing attack is an attempt by an attacker to gain access by posing as an employee or resource on a network. Phishing messages are often sent via e-mail and can include links that lead to malware infection. In addition, phishing messages often contain information about upcoming events (like company meetings) that appear legitimate but actually serve as opportunities for criminals who want money from you or your company’s assets without having any personal interaction whatsoever with those involved – making them ideal targets for these types of attacks!
Social engineering has become one of the most common methods used by hackers today because it allows them access without requiring any sort
One of the most important reasons for backing up your data is that some viruses can delete it from your computer. Many organizations have their files backed up regularly and can restore files that become corrupted because of viruses. For the same reason, you should save any important work only after you close all e-mail programs so there is no chance that a virus that deletes files can infect your computer while you are working.
Oops! Click Regenerate Content below to try generating this section again.
Conclusion
We have covered many different reasons for backing up data, but one of them is that you will be protected from viruses. Even if your computer gets infected by a virus, it can still save the files on your hard drive because it does not delete them. The same goes for backups, which will save you from losing all your important work if something goes wrong with the network or computer itself.