Copyright Goodheart-Willcox Co., Inc. Section 15.2 Internet Use in the Workplace 367 accept cookies. Check your browser for specifi c instructions. Another way to protect your computer is to delete cookies on a regular basis. Cookies can also be removed by running a disk cleanup utility. Phishing Phishing is tricking someone into giving out personal and fi nancial information. A common form of phishing is sending a fraudulent e-mail that appears to be from a legitimate source, such as a bank. The e-mail asks for certain information, such as a Social Security number or bank account number. Sometimes it provides a link to a web page. The linked web page looks real, but its sole purpose is to collect private information that will be used to commit fraud. Most legitimate organizations do not use e-mail to request this type of information. Never provide confi dential information in response to an unsolicited e-mail. Avoid clicking a link to a website in an e-mail. It is better to manually enter the website URL into a web browser. Never open an e-mail attachment that you are not expecting. Malware Malware, short for malicious software, is a term given to software programs that are intended to damage, destroy, or steal data. Beware of Lighthunter/Shutterstock.com Use caution and protect your privacy when using technology to communicate.
Previous Page Next Page