Skip to main content
BluINFO

*Attacks Can Be Reduced

Minimize people with access to data, computers, and networks

1. Identity Theft: steal money

2. *Ransomware: hold system hostage until paying

3. Phishing: extract info for other attacks

4. *Malware: destroy data/systems

5. *Public WiFi: extract info for other attacks

6. *BEC: Business Email Compromise – steal money

7. *Passwords: access systems and steal information

8. *Old Hard Drives: extract info for other attacks

moneyundertable.jpg

 

  • Was this article helpful?