Professional Documents
Culture Documents
METHODS TO SECURE TO DATA AND PERSONAL INFORMATION ONLINE - Continued
METHODS TO SECURE TO DATA AND PERSONAL INFORMATION ONLINE - Continued
❖ Can it be automated
❖ Who has access to the backup?
❖ When to run backup
-Users should always be careful when opening email attachments or hyperlinks in emails and other
messages.
-Some attachments or hyperlinks are fake and are designed to steal users’ personal information.