Six Ways to Play Your Part and Better Secure Your Workstation - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Keep Antivirus Current-2 Next

Keep Antivirus Current

With the automated nature of antivirus definition downloads, it is easy for users to forget the importance of having up-to-date antivirus definitions. Subscriptions can run out, or software errors and the inadvertent misconfiguration can cause virus definitions not to be updated.

As such, it is important to periodically check on antivirus solutions to ensure that virus definitions are indeed updated. Virus definitions aside, it makes sense to review the status of antivirus software periodically, given that the first action of many malware infections is to disable it.

In spite of the tremendous sums of money that organizations spend each year to defend themselves against hackers and malware, successful security incursions continue to occur with dismaying frequency. In the race to acquire the most sophisticated security tools, many forget that the first line of defense is really the user.

Our Paul Mah has come up with a list of six simple ways that employees can enhance the security of their workstations. Be sure to check out Paul's full post on the subject at his blog.

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.