Hackers have thousands of tools at their disposal to take advantage of you, including tools like keyloggers. Keystroke loggers record every single keystroke you type on your computer, including private email messages, bank account passwords, and credit card numbers. Most computer users don't think twice about security, but the reality is that failure to follow a few simple steps could result in identity theft or something worse. When connected to the Internet via a high-speed connection (DSL or cable), hackers can turn your computer into a "zombie" to launch attacks against thousands of other users and computers. There are several ways to avoid failure in a computer system that outsources to information technology. These include some areas: 3.1 BankingData Loss Prevention (DLP) is a security tool to prevent users from sending sensitive or critical information outside the company network. By using DLP you can prevent several problems such as data leakage, information loss and the like. The measures that can be taken to overcome this problem are through data loss protection. It plays an important role in ensuring that personal information is protected. The software used is CA 7 system software which controls payment processing and it was discovered that an update was corrupted. Payroll customers, payments and other transactions affected. It also leads to data loss issues and causes difficulty in performing other financial transactions. This will result in the customer being unable to withdraw cash and their bank account details. 3.2 Employees Banks that outsource information technology should also be competent in managing adequate planning that provides training and development f...... middle of paper .... ..rospace.org/assets/smc_wp -competitiveadvantage.pdf http://www.capgemini.com/resource-file-access/resource/pdf/b_Outsourcing_Allows_Distribution_Companies_to_Gain_Competitive_Advantage.pdf http://www.capgemini.com/resource-file- access/resource/pdf/b_Outsourcing_Allows_Distribution_Companies_to_Gain_Competitive_Advantage.pdf http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76 http://ec.europa.eu/taxation_customs/resources/ documents/customs/policy_issues/customs_security/threats_risks_solutions_en .pdf http://www.isqa.unomaha.edu/dkhazanchi/teaching/ISQA4590-8596/Readings/Supplemental%20Readings/week%2012/Risks-Benfits%20and%20Challenges%20in %20Global%20Outsourcing.pdf http:/ /www.sdms.org/resources/computer.asp http://esminfo.prenhall.com/computing/baase3e/Baase_Ch8.pdf http://wordprocessing.about.com/od/ troubleshooting/a/dataloss.htm
tags