Skip to main content

*Attacks Can Be Reduced

Minimize people with access to data, computers, and networks 1. Identity Theft: steal money 2. *Ransomware: hold system hostage until paying 3. Phishing: extract info for other attacks 4. *Malware: destroy data/systems 5. *Public WiFi: extract info for other attacks 6. *BEC: Business Email Compromise - steal money 7. *Passwords: access systems and steal information 8. *Old Hard Drives: extract info for other attacksmoneyundertable