Free Sample: Technology and Risks paper example for writing essay

Technology and Risks - Essay Example

Yet, these same consumers have no problem handing a credit or debit card to a stranger in a brick and mortar establishment. Somehow, consumers feel safer and secure with their information in someone else’s hands. Data theft is not limited to consumers; there have been numerous reports of security breaches within major cooperation. It is almost impossible to think a large company can be a victim of hacking. The truth of the matter is in 2000 major companies such as H & R Block, E- Trade and Western Union all had their information systems hacked exposing the arsenal information of its customers. Greetings, 2002) In 2013, Target became the latest victim of a security breach, compromising the personal information of over 100 million customers. This breach was very costly to the company, it is estimated that the company lost over 100 million dollars, had a 46% drop in revenue and forced the CEO to step down. (Krebs, 2014) I guess one could ask the question, “Exactly how are these systems being breached? ” Some may think there is a single cynical person sitting alone in the dark trying to take over the world by stealing the oral’s personal information.

The fact of the matter is these systems are compromised in various fashions. Mallard and Malicious Websites: Mallard and malicious websites are specifically designed with viruses to sabotage a company or personal hard drive to steal confidential information. These sites encourage the user to open an attachment; if the attachment is opened a virus consumes the system, stealing data and wreaking havoc on a company or consumer. Skimming and Phony Websites: Another risk in technology is skimming and fake websites. Hackers can create a aka website requiring the user to “register” with a user ID and password.

If the user ID and password is the same as other accounts, hackers will use this information to attempt to break into other accounts, including banking information. Skimming is the tactic used to steal your information without your credit or debit card leaving your sight. Skimming takes place when a consumer swipes their card in a gas station, restaurant or even an ATM. When the card is swiped there is a small undetectable device that steals your card number and passwords, thus making it impel for a thief to steal your money or in extreme cases duplicate your card.

Whether it is a Fortune 500 company or a 500 dollar consumer purchase, no one is immune to system hacking. However, some of these risks can be decreased by installing mallard, virus protection and firewalls. In some cases risks can be eliminated by using common sense, never access personal information on a public computer, do not use any Tam’s that look strange or have any unusual devices attached to them. Use various passwords on different sites and never give financial information to any company or person you are not familiar with.

If it sounds too go to be true it probably is, no one is going to share their African wealth with you, if y help fund the trip. As a company, firewalls should be the first of many levels of security; subsequent protection should include mallard, virus protection, and limitation of access to certain areas of an information system. Limiting downloading files and reducing the size of these files can help prevent accidental viral infections. As technology continues to change, you should change along with it.