Radical Rewrites Chapter 4 4.1 Radical Rewrite: Manager’s Wordy Malware Warning (L.O. 1–5) Your Task. Study the following ineffective message from a manager to employees and staff. It suffers from numerous wordy constructions covered in this chapter. Study the message and list at least five weaknesses. Then revise to avoid excessive wordiness and repetition. To: Employees and Staff From: Zach Brogdon Subject: Computer Attacks I am sending this message because hackers using malware spread by e-mail are targeting many organizations, I think it’s a good time to give consideration to five incredibly important tips that are really helpful in preventing infection on your machine. Following are the tips: Tip 1: Before opening an incoming e-mail, check the address of the person who sent the message. This is usually in the header. If it looks suspicious, don’t open. Tip 2. Look carefully at the subject line. Does it claim your account will be suspended or your account suffered an unauthorized login attempt? Attempts at urgency often are clues to malicious e-mail. Tip 3. Do you see that the sender doesn’t seem to know your name and that you are addressed anonymously as “Valued Customer”? Senders who are legitimate in all probability know your name. Tip 4. In the matter of attachments, click only on those from senders that you know. There is danger in attachments because that’s where viruses may hide or lurk. Tip 5. Don’t believe everything you see in an e-mail. Scammers are spectacularly clever at spoofing brands that we all know. As a final note, if an incoming e-mail looks fishy, please use Shift Delete, which will permanently delete the e-mail. Don’t just delete, which does not remove it permanently. I hope these tips are useful!! Zach
Radical Rewrites Chapter 4 4.1 Radical Rewrite: Manager’s Wordy Malware Warning (L.O. 1–5) Your Task. Study the following ineffective message from a manager to employees and staff. It suffers from numerous wordy constructions covered in this chapter. Study the message and list at least five weaknesses. Then revise to avoid excessive wordiness and repetition. To: Employees and Staff From: Zach Brogdon Subject: Computer Attacks I am sending this message because hackers using malware spread by e-mail are targeting many organizations, I think it’s a good time to give consideration to five incredibly important tips that are really helpful in preventing infection on your machine. Following are the tips: Tip 1: Before opening an incoming e-mail, check the address of the person who sent the message. This is usually in the header. If it looks suspicious, don’t open. Tip 2. Look carefully at the subject line. Does it claim your account will be suspended or your account suffered an unauthorized login attempt? Attempts at urgency often are clues to malicious e-mail. Tip 3. Do you see that the sender doesn’t seem to know your name and that you are addressed anonymously as “Valued Customer”? Senders who are legitimate in all probability know your name. Tip 4. In the matter of attachments, click only on those from senders that you know. There is danger in attachments because that’s where viruses may hide or lurk. Tip 5. Don’t believe everything you see in an e-mail. Scammers are spectacularly clever at spoofing brands that we all know. As a final note, if an incoming e-mail looks fishy, please use Shift Delete, which will permanently delete the e-mail. Don’t just delete, which does not remove it permanently. I hope these tips are useful!! Zach
Chapter1: Taking Risks And Making Profits Within The Dynamic Business Environment
Section: Chapter Questions
Problem 1CE
Related questions
Question
Radical Rewrites Chapter 4
4.1 Radical Rewrite: Manager’s Wordy Malware Warning (L.O. 1–5)
Your Task. Study the following ineffective message from a manager to employees
and staff. It suffers from numerous wordy constructions covered in this chapter.
Study the message and list at least five weaknesses. Then revise to avoid excessive
wordiness and repetition.
To: Employees and Staff
From: Zach Brogdon
Subject: Computer Attacks
I am sending this message because hackers using malware spread by e-mail are
targeting many organizations, I think it’s a good time to give consideration to five
incredibly important tips that are really helpful in preventing infection on your
machine. Following are the tips:
Tip 1: Before opening an incoming e-mail, check the address of the person who sent
the message. This is usually in the header. If it looks suspicious, don’t open.
Tip 2. Look carefully at the subject line. Does it claim your account will be
suspended or your account suffered an unauthorized login attempt? Attempts at
urgency often are clues to malicious e-mail.
Tip 3. Do you see that the sender doesn’t seem to know your name and that you are
addressed anonymously as “Valued Customer”? Senders who are legitimate in all
probability know your name.
Tip 4. In the matter of attachments, click only on those from senders that you know.
There is danger in attachments because that’s where viruses may hide or lurk.
Tip 5. Don’t believe everything you see in an e-mail. Scammers are spectacularly
clever at spoofing brands that we all know.
As a final note, if an incoming e-mail looks fishy, please use Shift Delete, which will
permanently delete the e-mail. Don’t just delete, which does not remove it
permanently. I hope these tips are useful!!
Zach
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 2 steps
Recommended textbooks for you
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Management Information Systems: Managing The Digi…
Management
ISBN:
9780135191798
Author:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
PEARSON
Business Essentials (12th Edition) (What's New in…
Management
ISBN:
9780134728391
Author:
Ronald J. Ebert, Ricky W. Griffin
Publisher:
PEARSON
Fundamentals of Management (10th Edition)
Management
ISBN:
9780134237473
Author:
Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:
PEARSON