The following wordy and poorly expressed e-mail from a CEO discusses a growing problem for organizations: how
Question:
The following wordy and poorly expressed e-mail from a CEO discusses a growing problem for organizations: how to avoid the loss of valuable company data to hackers.
Your Task.
Study the e-mail, list its weaknesses, and then rewrite it in the form of an instruction message. Is it better to use bullets or numbers for an internal list?
Transcribed Image Text:
Staff Members To: From: G. B. Goldman Subject: Hackers! Staff Members: This is to inform you that, like other banks, we are afraid of hackers. We fear that employees will expose valuable information to hackers without realizing what they are doing. Because of our fear, we have consulted cybersecurity experts, and they gave us much good advice with new procedures to be followed. Here are the procedures suggested by experts: 1. We don't want you to leave out-of-office messages. These voice mail or e-mails might explain when you will be away. Such messages are a red flag to hackers telling them that your computer is vacant and not being monitored. 2. Because smartphones can be lost or stolen, don't snap photos of company documents. Phones may be lost or stolen, and our data might be compromised. 3. Although small memory devices (thumb drives) are handy and easy to use, you may be inclined to store company files or information on these drives. Don't do it. They can easily be lost, thus exposing our company information. 4. Using work e-mail addresses for social media is another problem area. When you post details about your job, hackers can figure out an organization's best target. 5. Phishing links are the worst problem. Any request for password information or any requests to click links should be viewed with suspicion. Never click them. Even messages that seem to be from high-level officials or the human resources department within our own company can be sophisticated, realistic fakes. Examples include a request to click a link to receive a package or to download a form from within the company. We want to let you all know that within the next two months, we plan to begin implementing a program that will educate and train employees with regard to what to avoid. The program will include fake phishing messages. The program will be explained and you will learn more from your managers in training workshops that are scheduled to begin September 1. G. B. Goldman, CEO First Federal Savings and Loan | gbgoldman@firstfederalsaving.com | 678-405-3302
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 25% (4 reviews)
The provided image contains an email message from a CEO addressing the concern of data security and prevention of hacking incidents within the company Weaknesses of the email 1 Poor Structure The emai...View the full answer
Answered By
S Mwaura
A quality-driven writer with special technical skills and vast experience in various disciplines. A plagiarism-free paper and impeccable quality content are what I deliver. Timely delivery and originality are guaranteed. Kindly allow me to do any work for you and I guarantee you an A-worthy paper.
4.80+
27+ Reviews
73+ Question Solved
Related Book For
Essentials Of Business Communication
ISBN: 9781337386494
11th Edition
Authors: Mary Ellen Guffey, Dana Loewy
Question Posted:
Students also viewed these Business questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Read the case study "Southwest Airlines," found in Part 2 of your textbook. Review the "Guide to Case Analysis" found on pp. CA1 - CA11 of your textbook. (This guide follows the last case in the...
-
The Crazy Eddie fraud may appear smaller and gentler than the massive billion-dollar frauds exposed in recent times, such as Bernie Madoffs Ponzi scheme, frauds in the subprime mortgage market, the...
-
(a) Employing the intercept technique, determine the average grain size for the steel specimen whose microstructure is shown in Figure (a); use at least seven straight-line segments. (b) Estimate the...
-
Dark Nebulae and the Interstellar Medium the dark area in Fig. 18.30 that appears devoid of stars is a dark nebula, a cold gas cloud in interstellar space that contains enough material to block out...
-
i do not understand how to solve these questions. please explain the methods and steps to solve. thankyou 2. (5 marks) Consider the function: f(x) =-r+r+212 -1 Show that at least one root exists in...
-
(Appendix 3A) Briefly explain how net earnings are measured and why publicly accountable enterprises are required to prepare a statement of comprehensive income.
-
Due to rapid turnover in the accounting department, a number of transactions involving intangible assets were improperly recorded by the Buek Company in 2014. 1. Buek developed a new manufacturing...
-
Tonks, 6 8 and single, receives a salary of $ 1 6 0 , 0 0 0 . Two years ago she was gifted stock by her uncle. At the time of the gift the FMV of the stock was $ 6 1 , 0 0 0 and her uncle's Basis in...
-
When a company received an expensive office painting with sags in the canvas, it complained. The seller, Central Park Gallery, responded with the following adjustment letter. How can it be improved?...
-
The following letter requests information, but its disorderly and illogical presentation makes the reader work too hard to comprehend what is being requested. Based on what you have learned in this...
-
Let \(\mathbf{F}=\left\langle y^{2}, x^{2}, z^{2}ightangle\). Show that \[ \int_{C_{1}} \mathbf{F} \cdot d \mathbf{r}=\int_{C_{2}} \mathbf{F} \cdot d \mathbf{r} \] for any two closed curves going...
-
A company has a throughput time of 32 days. It wants to reduce this time to eight days. To do so, it will need to change its layout at a cost of $150,000. It believes that its inventory level will...
-
Avon manufactures and sells cosmetics primarily to women using a sales force consisting of part-time sales representatives offering the products through in-home sales parties. Sales representatives...
-
Solarcom uses a JIT production system to manufacture its solar-powered DVD players. Solarcom has adopted backflushing to streamline its accounting system. It accumulates all conversion costs for the...
-
James Industries is considering a shift to JIT. The president insists that reducing inventory can save considerable costs. The marketing manager is worried, however. She recognizes that the inventory...
-
The president of Kelly Windows is an avid believer in JIT. Kelly Windows manufactures bay windows. The president wants no inventory or work-in-process on the floor at the end of each day. Windows are...
-
What are the different categories of hedge funds?
-
How can you tell from the vertex form y = a(x - h) 2 + k whether a quadratic function has no real zeros?
-
What special skills do customer-service representatives in chat sessions require?
-
What is bias-free language? Provide several examples of biased language and bias-free alternatives.
-
Is it necessary to follow a writing process in preparing a short message? A long message? Why or why not?
-
WEEK 1 HOMIWORK Question 8 Lydia Cravette operates a florist shop called Scents Unlimited Ltd . During the month of May, the following things occurred: She spent $ 2 1 0 on the telephone system, $ 4...
-
Dauphine Company is contemplating an investment in a project with a 3 - year life span. The initial investment is $ 4 5 , 1 8 0 and net annual cash flows were $ 2 1 , 0 0 0 for year 1 ;$ 2 4 , 0 0 0...
-
Standard Product Cost, Direct Materials Variance H . J . Heinz Company uses standards to control its materials costs. Assume that a batch of ketchup ( 9 0 0 pounds ) has the following standards: \...
Study smarter with the SolutionInn App