• Home
  • Blog
  • Supporting Activity: Network Security I

Supporting Activity: Network Security I

0 comments

7  Not all security breaches are malicious. A network user may be routinely scanning through his or her files and come across a filename that isn’t familiar. The user may then call up the file, only to discover that it contains confidential personnel information, juicy office gossip, or your resume. Curiosity, rather than malice, is often the source of security breaches

 

8 It is always important to monitor the communication networks and make sure everything is up-to-date and working as it should be. This is true for all users both businesses and home users. Anyone who uses the Internet is at risk. I feel like everyone (all age groups) should be educated on the risks. We have so many young kids now a day’s using smart phones because it’s the “in thing” but I am not sure if parents really know the risks.

 

 

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}