Question: Instructions: Please rewrite this e-mail. You will find this e-mail suffers from a vague and imprecise subject line. It includes a long lead-in and wordy

Instructions: Please rewrite this e-mail. You
Instructions: Please rewrite this e-mail. You
Instructions: Please rewrite this e-mail. You
Instructions: Please rewrite this e-mail. You
Instructions: Please rewrite this e-mail. You
Instructions: Please rewrite this e-mail. You
Instructions: Please rewrite this e-mail. You will find this e-mail suffers from a vague and imprecise subject line. It includes a long lead-in and wordy opening paragraph. It uses a numbered list suggesting a sequence of steps instead of the preferred bulleted list. Also, the listing does not begin each line of instruction with a verb (parallel construction) in parallel form. The e-mail suffers from wordiness throughout. Could readability be improved with bold summary headings for each procedural item? Submit the typed revision file with the corrections; save your file using YourLastNameFirstInitial, Activity 8.5. To: Staff Members From: G. B. Goldman Subject: Hackers! Staff Members: > This is to inform you that, like other banks, we are afraid of hackers. We fear that employees will expose valuable information to hackers without realizing what they are doing. Because of our fear, we have consulted cybersecurity experts, and they gave us much good advice with new procedures to be followed. Here are the procedures suggested by experts: 1. We don't want you to leave out-of-office without realizing what they are doing. Because of our fear, we have consulted cybersecurity experts, and they gave us much good advice with new procedures to be followed. Here are the procedures suggested by experts: 1. We don't want you to leave out-of-office messages. These voice mail or e-mails might explain when you I will be away. Such messages are a red flag to hackers telling them that your computer is vacant and not being monitored. 2. Because smartphones can be lost or stolen, don't snap photos of company documents. Phones may be lost or stolen, and our data might be compromised. 3. Although small memory devices (thumh 3. Although small memory devices (thumb drives) are handy and easy to use, you may be inclined to store company files or information on these drives. Don't do it. They can easily be lost, thus exposing our company information. 4. Using work e-mail addresses for social media is another problem area. When you post details about your job, hackers can figure out an organization's best target. 5. Phishing links are the worst problem. Any request for password information or any requests to click links should be viewed with suspicion. Never click them. Even messages that seem to be from high-level officials or the human resources 5. Phishing links are the worst problem. Any request for password information or any requests to click links should be viewed with suspicion. Never click them. Even messages that seem to be from high-level officials or the human resources department within our own company can be sophisticated, realistic fakes. Examples include a request to click a link to receive a > package or to download a form from within the company. We want to let you all know that within the next two months, we plan to begin implementing a program that will educate and train employees with regard to what to avoid. The program will include fake phishing messages. The program 11 + package or to download a form from within the company. We want to let you all know that within the nex two months, we plan to begin implementing a program that will educate and train employees with regard to what to avoid. The program will include fake phishing messages. The program will be explained and you will learn more from your managers in training workshops that are scheduled to begin September 1. G. B. Goldman, CEO

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!