*Attacks Can Be Reduced
Minimize people with access to data, computers, and networks1. Identity Theft: steal money 2. *Ransomware: hold system hostage until paying 3. Phishing: extract info for other attacks 4. *Malware: destroy data/systems 5. *Public WiFi: extract info for other attacks 6. *BEC: Business Email Compromise – steal money 7. *Passwords: access systems and steal information 8. *Old Hard Drives: extract info for other attacks |