The following wordy and poorly expressed e-mail from a CEO discusses a growing problem fororganizations: how to avoid the loss of valuable company data to hackers.
Your Task. Study the e-mail and then rewrite it in the form of an instruction message.
Things to concider: Is it better to use bullets or numbers for an internal list?
To:
Staff Members
From: G. B. Goldman
Subject: Hackers!
Staff Members:
This is to inform you that, like other banks, we are afraid of hackers. We fear that employees will
expose valuable information to hackers without realizing what they are doing. Because of our
fear, we have consulted cybersecurity experts, and they gave us much good advice with new
procedures to be followed. Here are the procedures suggested by experts:
1. We don’t want you to leave out-of-office messages. These voice mail or e-mails might
explain when you will be away. Such messages are a red flag to hackers telling them that
your computer is vacant and not being monitored.
2. Because smartphones can be lost or stolen, don’t snap photos of company documents.
Phones may be lost or stolen, and our data might be compromised.
3. Although small memory devices (thumb drives) are handy and easy to use, you may be
inclined to store company files or information on these drives. Don’t do it. They can easily be
lost, thus exposing our company information.
4. Using work e-mail addresses for social media is another problem area. When you post
details about your job, hackers can figure out an organization’s best target.
5. Phishing links are the worst problem. Any request for password information or any requests
to click links should be viewed with suspicion. Never click them. Even messages that seem
to be from high-level officials or the human resources department within our own company
can be sophisticated, realistic fakes. Examples include a request to click a link to receive a
package or to download a form from within the company.
We want to let you all know that within the next two months, we plan to begin implementing a
program that will educate and train employees with regard to what to avoid. The program will
include fake phishing messages. The program will be explained and you will learn more from
your managers in training workshops that are scheduled to begin September 1.
G. B. Goldman, CEO
First Federal Savings and Loan | gbgoldman@firstfederalsaving.com | 678-405-3302
DESCRIPTION
After reading Chapter 5, Short Workplace Messages and
Digital Media, what do you think your strengths and
weaknesses are concerning drafting proper business
messages? Please write your discussion post with good
sentence structure and grammar. Include one in-text
citation and don’t forget to include your reference. I’m
looking for well-thought-out discussion board posts.
Please submit original discussion Monday, July 20th by
11:30 pm and thoughtfully respond to at least two
classmates by Thursday, July 23rd by 11:30 pm. Your
initial post should be between no less than 3-5 sentences.
* Please use one in-text citation from Chapter 5 for your
first initial post and add the proper reference of the
textbook.
Topics to keep in mind:
.
Composing an email Ex: Subje
and Closing
line, Opening, Body
Subject lines in an email
Email Etiquette
Texting for business Ex: Benefits vs. Risk
Best practices for business text messages
Emall Project
Attached Files:
Week 3_BAD EMAIL ASSIGNMENT HACKERS.docx A (15.105 KB)
Read and analyze the sample email that is provided. Reconstruct the message for readability and effectiveness. Submit email revision project in a word or PDF file by
Thursday, July 23rd by 11:30 pm. Refer back to the PDF and live lecture for additional instructions.
Things to keep in mind:
• Identify key points
• Grammar
• Well-constructed sentences
• Professionalism
• Avoid buzzwords & figures of speech
• Proofread your work