Service receive & sending SMS

7 sins of using the Internet at work

1640   |     /   Security

7 sins of using the Internet at work
According to a new study, almost four out of five technology experts believe that employees put their companies at risk by not being able to act safely on the Internet.

In a study conducted by the Sophos antivirus company, 79% of the IT professionals surveyed said that despite the instructions from their teams, many employees continue to open unsolicited email messages and attachments and unintentionally download spyware from websites.

 rent sim cards online

“In most cases, it’s not that people consciously behave recklessly on the Internet,” rather they don’t know how to act responsibly, and may not be fully aware of the potential consequences of an unsafe Internet and the use of email, said Graham Cluley, Sr. Technical Consultant Sophos. “If employees download and open unwanted attachments or surf the Internet, it is the company's responsibility to ensure that employees are aware of the risks and provide the right tools to protect themselves.

So what is the sinful seven? Here is a list of Sophos - risky online activities at work:

1. Download music and movies.

2. Opening email attachments or clicking on links in unsolicited emails.

3. Surfing pornographic or other dubious sites.

4. Launching programs sent by friends and colleagues.

5. Installing unauthorized software and web browser plugins.

6. Providing information to unknown persons by phone or email.

7. Using the same password on different websites.

In another survey, Sophos found that 63% of IT professionals believe that employees who do not follow safe calculation rules should receive formal warnings and that these warnings should go all the way to potential failures. About 10% of respondents feel so strongly about risky behavior on the Internet that, in their opinion, there should be no excuses to dismiss on the spot.

Similar news

Question and Answer Authentication

In information security, request-response authentication is a type of authentication protocol in which one entity represents a problem or question and another entity provides a valid authentication response. Request-response authentication is an authentication method used to confirm the identity of a user or other object requesting access to a computer, network, or other network resource. This ...

How to stop SIM card scammers from draining your bank account?

If you haven’t experienced a SIM fraud, consider yourself lucky. This is a relatively new, complex form of fraud that allows hackers to access bank accounts, credit card numbers, and other personal data. It’s hard to notice and even harder to undo the damage received.

Beware of attacks on SIM cards (SIM interception)

A SIM attack, also known as a SIM interception attack, is a form of identity theft in which an attacker convinces the owner of a cell phone to switch the victim’s phone number to a new device to gain access to bank accounts, credit card numbers and other confidential information. Relatively new and growing attacks on SIM cards are becoming increasingly popular due to the growing reliance on aut...


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved