Loading
All Modules View all topics Close topics
Privacidad y seguridad informática
Anterior Previous slide Next slide Siguiente

2.3 Medidas para proteger el correo electrónico y mensajería instantánea

  • Apuntes
  • Revisión por tema
    WAI P.
    TH
    WAI P.

    E-mail and Instant Messaging (IM) are widely used for business and personal communication. However, hackers, online predators, and the people who create worms and viruses use e-mail and IM for malicious purposes. For example, these people can send e-mail attachments containing harmful software. These people can also use e-mail to solicit sensitive information or to lure you into fake offers. It is therefore important for you to take certain measures to ensure e-mail and IM security. To ensure e-mail security, avoid opening e-mail with attachments, do not respond to junk mail, do not respond to unsolicited commercial mail, and protect yourself from phishing. To ensure IM security, chat with known people only and do not open attachments received over IM.

    Janeya Z.
    TH
    Janeya Z.

    helpful.

Notification

You have received a new notification

Click here to view them all