Six Ways to Play Your Part and Better Secure Your Workstation - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Use Common Sense Before You Click-7

Use Common Sense Before You Click

Next

Users who indulge in obtaining files from dubious locations or P2P sources are putting themselves at extreme risk of contacting a virus infection. It is relatively trivial to create a Trojan on top of legitimate (or working) software, and users might be left none the wiser.

Next
In spite of the tremendous sums of money that organizations spend each year to defend themselves against hackers and malware, successful security incursions continue to occur with dismaying frequency. In the race to acquire the most sophisticated security tools, many forget that the first line of defense is really the user.

Our Paul Mah has come up with a list of six simple ways that employees can enhance the security of their workstations. Be sure to check out Paul's full post on the subject at his blog.
 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.