Why Application Control is Vital for IT Security
1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2.