Rules for Restricted Data

 

Malware

Email has long been a method for cyber-criminals to distribute malware, usually as attachments. These vary from

Phishing

Spam

Passwords

Protect your computer

Encryption

Back to top button