The key to protecting digital communication systems against fraud, hackers, identity theft, and other threats is

A. using file-sharing services.
B. hiring ethical employees.
C. creating a well-funded IT department.
D. using prevention techniques like strong passwords.
E. minimizing turnover.


D. using prevention techniques like strong passwords.

The key to protecting digital communication systems against fraud, hackers, identity theft, and other threats is prevention. One technique is to pick strong passwords with a mix of letters, symbols, and numbers

Business

You might also like to view...

What is meant by the term liquidity and why are stakeholders interested in ratios that measure it?

Business

A business can be organized as a sole proprietorship, partnership, corporation, or limited-liability company (LLC)

Indicate whether the statement is true or false

Business

When one is merging or being acquired, ________.

A. it is typically a quick and emotionless process B. it is typically concluded within a few weeks C. it can be an emotionally draining experience and take over a year D. None of these.

Business

Cindy earned a 10 percent increase in her salary and received the entire increase at the beginning of the year, with the stipulation that she would not leave the company in that year. Five months later, she quit her job and went to work for a competitor. She had to return the 10 percent payment she had received because she had violated a rule for

A. lump-sum salary increase. B. profit-sharing. C. commission. D. employee benefit. E. wage compensation.

Business