Professional Documents
Culture Documents
SECURITY
CASE STUDY
Chiong, Iza Faith M.
BS Accounting Information Systems - 4
DISCUSSION
QUESTIONS:
• Knowing how the firm responded, what would you
have done differently?
• What are some steps you think the firm could have
taken to prevent this incident?
H AV E D O N E
D I F F E R E N T LY ?
It’s generally not advisable Most browsers nowadays If the URL of the website
to click on a link in an email will enable you to download doesn’t start with “https”, or
or message, even if you add-ons that spot signs of a you cannot see a closed
know the sender. malicious website or alert padlock icon next to the URL,
you about known phishing do not enter any sensitive
sites information or download files
from that site.
Security patches and updates Firewalls are an effective This offers a user additional
are released for a reason, most way to prevent external protection against phishing
commonly to keep up to date attacks, acting as a shield tactics by only granting access to
with modern cyber-attack a website or app once the user
between your computer and
methods by patching holes in has fulfilled the requirements of
an attacker. the authentication mechanism.
security.
Know what a phishing scam Rotate passwords regularly Don’t be tempted by those Don’t give out important
looks like pop-ups information unless you must