article thumbnail

Information Literacy and Records Management

Brandeis Records Manager

Presidential Committee on Information Literacy states that “to be information literate, a person must be able to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information.” Should it exclude avoiding rogue apps, weak passwords, and phishing attempts?

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Attackers often use botnets to send out spam or phishing campaigns to carry out distributed denial of service (DDoS) attacks. Phishing and Social Engineering. More targeted efforts at specific users or organizations are known as spear phishing. How to Defend Against Phishing. Examples of Phishing Malware Attacks.

Phishing 105