Edudorm Facebook

Trojan horse

In this digital era, information theft has become a frequent thing, with hackers coming up with ways of getting access to the information that might be private. Even big cooperation suffers from this as others tend to lose millions in a night. There are several ways that hackers use to get information about their targets.

The use of Trojan horse is the most common. A Trojan horse is a virus that most hackers can use to get information about the employees. Once a Trojan is installed, most of them are programmed in such a way that they record anything that you type in, this include passwords, work details or even personal information. Most of the time these viruses are disguised as phishing email that when a person clicks to read it is automatically installed to the single computer or the whole work space computers if they share a common network. One way to stop this breach of security is to educate all the employees of such viruses and make them knowledgeable about these. The employees should be taught not to simply anything that they find on the internet. Another way is an up to date security software that can detect and stop any Trojan before it is installed.

Another method used by hackers is by bypassing passwords. Most people use overly easy passwords such a s their names, their birthdates, or even the name of their pets as their passwords. The worst part is most of these details are left open for every in their social media accounts making them even more vulnerable to getting hacked.one ways to stop hackers from bypassing your passwords you should use passwords that is not easily known. Also when answering security questions, you should just give random answers that are not even related to the questions asked. By ensuring that your password and security questions are not too obvious then you protect your computer from hackers.

It is important that every organization understand the legal ramifications that come with handling data. The HR function is to ensure that the country, state and province regulations are followed to the letter. If the operation is across international borders, there will be expanse legality and the HRIS system should adhere to it. For instance, the European union prohibits intercounty data sharing of personally identifying information. Knowing such limitation is very important for any HRIS in ensuring they follow the legal requirement (Kavanagh, Thite & Johnson,2015).

Reference

Kavanagh, M. J., Thite, M., & Johnson, R. D. (2015). Human resource information systems: Basics, applications, and future directions.

“Massive cyberattack strikes Anthem” video. Retrieved from: http://www.reuters.com/video/2015/02/05/massive-cyberattack-strikes anthem?videoId=363104985&mod=related&channelName=cybersecurity

 

441 Words  1 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...