Question

In: Operations Management

The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the...

The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the message is clumsy and fails to include essential information in revealing security breaches to customers.

Your Task. List at least seven weaknesses Revise this message using the suggestions you learned in this chapter about security breach messages.

To: Kara Khalial [[email protected]] From: Justin Small [[email protected]]

Subject: Customer Security Incident at Princeton Payment Systems Cc: Bcc:

Companies and individuals across the country are experiencing more and more security breaches. This email is because of a recent unfortunate security breach at Princeton Payment Systems. However, as a customer of Princeton, your privacy was never at risk. We promise to guard your privacy around the clock. Hackers last week were able to exploit a new function that we were trying to use to make the customer log-in process faster for you and our other customers.. You should be aware of scams that may result from your address being used in phishing scams. To learn more, go to http://www.fdic.gov/consumers/consumer/alerts/phishing.html. To provide even more information about this incident, the U.S. postal service will bring you a letter. Taking your privacy very seriously, e-mail addresses are heavily protected here at Princeton. Within hours of the hacker break-in, the log-in mechanism was disabled and a new procedure was established. The user is now required to enter their e-mail address and their password before they can log in successfully. E-mail addresses were the only information the hackers got. Other information such as account information and other personal information were never risked. We appreciate you being a Princeton customer. Sincerely,

Solutions

Expert Solution

1. Email address is confidential and should be protected by customers at any cost as it possess various information.

2. The new function that we are planning to implement has been exploited by hackers and may be used to cause security issues so the customers can actually protect their email accounts by changing their passwords.

3. As we prioritize security so within hours of the issue care was taken to protect the email address of employees.

4. The new functionality was removed and a different mechanism was introduced so that hackers fail to penetrate.

5. The hackers got details of the email address of the customers but not any other information

6. Customers may receive Spam and phishing mails so it is better to re verify mails from untrusted sources.

7. The details of the customers are safe at Princeton and such incidents will not be repeated which actually cause issue in maintaining security.


Related Solutions

In November of 2015, STI customers were notified by e-mail that their accounts had been compromised...
In November of 2015, STI customers were notified by e-mail that their accounts had been compromised and were being restricted unless they re-registered using an accompanying hyperlink to a Web page that had STI’s logo, home page design, and internal links. The form had a place for them to enter their credit card data, ATM PINs, Social Security number, date of birth, and their mother’s maiden name. Due to the diligent efforts of Tommy Lew, STI customer information was not...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Business USA Subject: Official Notice for all users of Big Bank! Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will...
E-cigarettes (vaping) have been touted as a safer alternative to smoking. However, recent studies have pointed...
E-cigarettes (vaping) have been touted as a safer alternative to smoking. However, recent studies have pointed to many side-effects to vaping. The amount of students who are vaping has also significantly increased. Should e-cigarettes still be considered as a safer alternative to smoking? Should the FDA (Food Drug Administration) increase warning people about the possible dangers of vaping? Should the government increase regulation of companies that are targeting teenagers to start vaping? Read the articles below to help formulate your...
6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent...
6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent by the CEO to all employees. Step 1: Identify five or more weaknesses describing why each is a weakness. Step 2: Revise this e-mail so that it reflects writing techniques you learned in this and previous chapters. To:           Staff Members From:          G. B. Goldman <[email protected]> Subject: Hackers!                 Staff Members: This is to inform you that, like other banks, we are afraid of hackers....
You have been asked to audit your company security plan as it applies to acceptable employee use of the Internet and e-mail.
You have been asked to audit your company security plan as it applies to acceptable employee use of the Internet and e-mail. Write a preliminary audit plan, including scope, objectives, and audit steps.
13.1 Radical Rewrite: Rescuing a Slapdash Résumé (Obj. 4) The following poorly organized and written résumé...
13.1 Radical Rewrite: Rescuing a Slapdash Résumé (Obj. 4) The following poorly organized and written résumé needs help to remedy its misspellings, typos, and inconsistent headings. Your Task. By using the information in the resume, revise Isabella’s resume into a correctly formatted one-page chronological resume. RESUME OF ISABELLA R. JIMENEZ 1340 East Phillips Ave., Apt. D Littleton, CO 80126 Phone 455-5182 • E-Mail: [email protected] OBJECTIVE I am dying to land a first job in the “real world” with a big...
For your written assignment: Construct an E-R diagram for a car-insurance company whose customers own one...
For your written assignment: Construct an E-R diagram for a car-insurance company whose customers own one or more cars each. Each car has associated with it zero to any number of recorded accidents.
1. We have seen that, in general, workplace e-mail monitoring is legal. In the landmark Smyth...
1. We have seen that, in general, workplace e-mail monitoring is legal. In the landmark Smyth v, Pillsbury case at the start of this chapter, employees fired for messages sent through the employer's server, even when password-protected, and even when the employer had issued assurances that they would not be for retaliatory purposes, had no recourse. But what if the employer monitors messages sent on company-owned computers through a personal e-mail account, such as Yahoo? In 2008, Scott Sidell allegedly...
Which of the following business messages would not use the direct strategy? a. An e-mail message...
Which of the following business messages would not use the direct strategy? a. An e-mail message to a staff introuducing a new employee b. A letter a customer denying his or her request for credit c. A letter to a coworker congratulating him or her on a recent promotion d. An oral presentation detailing the specifics of a new company wellness initiative
PC2 and PC4 have been configured correctly with the IP addresses 172.156.2.22 and 172.156.2.44. But PC2...
PC2 and PC4 have been configured correctly with the IP addresses 172.156.2.22 and 172.156.2.44. But PC2 cannot communicate with PC4 (i.e., they cannot ping each other). The network technician knows that the problem is related to some configuration settings. What would be missing in the configuration? On which device(s)? [write your answer in no more than 25 words] Based on your answer in (1), what will you do to prove that you are right? [write your answer in no more...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT