Purchase Solution

Focus on Technology

Not what you're looking for?

Ask Custom Question

Focus on Technology

Have you ever gone phishing? Probably not, but the Internet enables unscrupulous individuals to phish for your personal information. This and other types of attacks aimed at stealing your identity or your money are called "social engineering." Social engineering is remake of an old-fashioned con game that tricks people into giving information and then uses them it rob them. You might receive an e-mail, supposedly from PayPal, Amazon.com, or your bank, asking you to update your personal information. To make it easier for you, says the message, just click on the link in the e-mail to input your information. Don't do it! The click will take you to a site that looks legitimate but it really a skillfully designed fake, often located in another country. Even if you don't enter any personal information, just clicking on the link might put software on your computer that can track your keystrokes, revealing log-in and password information to the crooks.

Question:

Phishing scams also victimize businesses. Visits the Federal Trade Commission's Website (www.ftc.gov) to learn how businesses can deal with this problem and discuss recommendations for marketers who face this threat.

(AACSB: Communication; Reflective Thinking; Use of IT)

Purchase this Solution

Solution Summary

This solution gives you strong points concerning Focus on Technology

Solution Preview

Phishing scams also victimize businesses. Visits the Federal Trade Commission's Website (www.ftc.gov) to learn how businesses can deal with this problem and discuss recommendations for marketers who face this threat.30
There are several ways in which businesses can deal with the problem of Phishing. Businesses need to educate their customers about Phishing. The company should inform all its employees and customers what Phishing e-mails look like. For instance, the marketer should warn its customers against improperly spelled e-mails, or e-mails having incorrect grammar. Another way in which the customers and employees can be asked to identify Phishing is that such e-mails will not have account information in them. Ask your customers to examine the e-mail addresses, there will be no mention of your company's link in their URLs. One of the strongest giveaways is the existence of deadlines in the e-mails.
Apart from warning employees and customers there are some steps that marketers should use to avoid becoming a victim of Phishing. The marketer should follow the ...

Solution provided by:
Education
  • BSc , University of Calcutta
  • MBA, Eastern Institute for Integrated Learning in Management
Recent Feedback
  • "I read your comments, and thank you for this feedback. Do I need to find other studies that applied this methodology Ive used? That's where I'm stuck at."
  • "Thank you kindly sir. "
  • "Excellent and well explained. --Thank you kindly. "
  • "Awesome notes. I appreciate you."
  • "I have the follow-up project and I will assign that to you very soon. "
Purchase this Solution


Free BrainMass Quizzes
Lean your Process

This quiz will help you understand the basic concepts of Lean.

Introduction to Finance

This quiz test introductory finance topics.

Transformational Leadership

This quiz covers the topic of transformational leadership. Specifically, this quiz covers the theories proposed by James MacGregor Burns and Bernard Bass. Students familiar with transformational leadership should easily be able to answer the questions detailed below.

Employee Orientation

Test your knowledge of employee orientation with this fun and informative quiz. This quiz is meant for beginner and advanced students as well as professionals already working in the HR field.

Income Streams

In our ever changing world, developing secondary income streams is becoming more important. This quiz provides a brief overview of income sources.