Tuesday, August 14, 2018

Give four different types of business activity and demonstrate how to solve the problems in internet use.  [p4]

Error Massage
Non delivary Massage 
Blocking Unwanted Massage

Too many hits on search engine

Reducing the risk of using internet

1. Back up data
Business needs to make sure that all their information backed up to more secure. One of the easiest ways to create backups of business data is to simply store copies of important files on hard drives, tape drives or other storage devices connected to your systems or network. Copying files to hard drives, USB flash drives, external drives, or other devices attached to individual systems or devices connected via a local or wide area network is an effective way of ensuring backups are available locally when you need them. With any good data recovery plan, keeping local copies of backups is essential. However, due to risks associated with physical disasters, ransomware, theft, and other threats, keeping local backups should never be the only facet of your strategy. In addition to keeping up-to-date One of the easiest ways to create backups of business data is to simply store copies of important files on hard drives, tape drives or other storage devices connected to your systems or network. Copying files to hard drives, USB flash drives, external drives, or other devices attached to individual systems or devices connected via a local or wide area network is an effective way of ensuring backups are available locally when you need them. With any good data recovery plan, keeping local copies of backups is essential. However, due to risks associated with physical disasters, ransomware, theft, and other threats, keeping local backups should never be the only facet of your strategy. In addition to keeping up-to-date local backups of your files and data, you should always store at least one copy offsite as is required with the 3-2-1 rule 

2. increase your security password

 A good password manager, like Number password or Character password , creates strong, unique passwords for all of your accounts. That means that if one of your passwords does get caught up in a data breach, criminals won't have the keys to the rest of your online services. The best ones sync across desktop and mobile, and have autocomplete powers. Now, rather than having to memorize dozens of meticulously crafted passwords, you just have to remember one master key.

3. Add two-factor too.
  Hate to say it, but these days not even a password is enough. Many of the services you use today—social networks, banks, Google, and so on—offer an added layer of protection. It can come in the form of a code sent to your phone via SMS, or if you want to step it up, through software solutions like Google Authenticator or hardware like a YubiKey. SMS should be enough for most people; just know that like many entry level security precautions.

4.  Biometric recognition

This is the fingerprint recognition that serves as your password. The device “reads” your fingerprint and unlocks when it recognizes it as yours. As no two fingerprints are the same, you’re assured a high degree of security.