Eight Essential Layers of Security for Every PC

1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10
Previous Next

Click through to see eight essential tactics to protecting the PCs on your networks.

Our Sue Marquette Poremba got quite a bit of feedback on her blog post about layered security to protect PCs -- so much so that we decided to package up her list of eight must-have preventative measures into this quick slideshow. Her advice ranges from using the latest version of your favorite browser to ensuring that your network has monitoring tools in place that send up red flags when they see unusual behaviors.
As Roger Thompson, chief security officer with AVG Technologies told Sue:

The single most important thing to understand is that 99 percent of all attacks now originate from the Web. When you start a Web browser, it starts from a trusted place, inside the firewall, so that creates a trusted tunnel thru the firewall, and if a victim visits a Web site of hostile intent, the attack code is able to go right through the firewall, and has a chance of executing on the PC.

Also be sure to check out some of the great reader comments, including the post from Heunemann. who notes:

The bad guys test their malware against antivirus engines to ensure they can penetrate their signature and behavioral defenses. Then they feed their code onto software that generates variants. The timeframe between capture analysis and signature release is at best hours. In many cases it's days before the AV companies are able to respond. Av-test.org data shows that the number of unique malware samples has risen from about 3,000 per month in 2006 to 20,000 per month in 2009. Multiply these numbers by the number of variants, and it's no wonder that the most popular AV products have an 80 percent miss rate.

More Slideshows:

Seven Ways to Identify a Secure IT Environment A security checklist for IT pros.

The Secret Rules of Business Success (or Failure) Rules that define the differences between a company that is doing well and one that is failing.

Seven Tips to Attain Purpose and Happiness in Life and WorkIt may simply be a question of "when" not "if" a range of mobile computing devices displaces the PC.


Related Topics : Acer, Laptops, Peripheral Hardware, Sony, Windows

More Slideshows

IT_Man42-190x128 Five Ways IT Can Help Save Money by Printing Smarter

Managed properly, networked printing devices can often present many opportunities for IT to help reduce printing costs and conserve budgets. ...  More >>

AI1-190x128 Dispelling the Myths of Software Robots

Debunk common misconceptions about software robots and better understand how these next-generation machines will streamline ops in your business in the near future. ...  More >>

ShawTravelGadgets0x Eleven Gadget Gifts for Travelers

Traveling for business or pleasure is easier than ever with access to real-time information; apps to help schedule your itinerary and explore new locales; and ever-smaller gadgets to help you connect, organize, work and play. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Thanks for your registration, follow us on our social networks to keep up-to-date