This means that you must train employees how to identify various forms of phishing. At the same time, you must implement some kind of security procedures that will place a restriction, on how personal information is distributed. For example, employees could be trained in spotting various kinds of fictitious emails. However, when they run across an email like that is requesting information, there would be a procedure where the company will call the customer at the telephone number on file. This is significant, because it will improve the vigilance of: employees involving various phishing related emails. If for some reason, one happens to go through, no information can be released until you contact the customer at the telephone number they provide. This will prevent phishing, by having an initial process for detecting vulnerabilities and having some kinds of checks / balances in place. (Goldman, 2009) Once you have an effective procedure, you want to begin testing the underlying risks related to phishing. This is where you would have a team of security consultants, who would test the staff for various vulnerabilities using the latest techniques / scams. Over the course of time, this will...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now