You are on page 1of 1

Harden system to resist

attacks

Manage OS updates

Protect against buffer


overflows

Configure OS
protections
Computer
Configuration Antivirus and anti-
Guidelines spyware applications
Remove unnecessary
services, applications

Hardening computer
Malware Protection
Implement access configuration
control

User training and


Configure personal awareness
firewall

Protecting the Install on every


Workstation computer
Limit user rights Specific precautions:

Disable file extension Keep current with


hiding antivirus signatures

Many malware schemes Antivirus Software 1. Download new


rely on social signatures
engineering

2. Test antivirus
Prevent automatic downloads
download of graphics User Training Four key steps in
and audio in email deploying updated
signatures: 3. Deploy new
signatures, ensure
Don't open email proper distribution
Good practices for
attachments from
users:
strangers
4. Continue to monitor
periodaclly
Accept, open only
expected email
attachments

You might also like