dcsimg

Use Common Sense Before You Click

  • Use Common Sense Before You Click-
    Users who indulge in obtaining files from dubious locations or P2P sources are putting themselves at extreme risk of contacting a virus infection. It is relatively trivial to create a Trojan on top of legitimate (or working) software, and users might be left none the wiser.
1 | 2 | 3 | 4 | 5 | 6 | 7

Use Common Sense Before You Click

  • 1 | 2 | 3 | 4 | 5 | 6 | 7
  • Use Common Sense Before You Click-7
    Users who indulge in obtaining files from dubious locations or P2P sources are putting themselves at extreme risk of contacting a virus infection. It is relatively trivial to create a Trojan on top of legitimate (or working) software, and users might be left none the wiser.
In spite of the tremendous sums of money that organizations spend each year to defend themselves against hackers and malware, successful security incursions continue to occur with dismaying frequency. In the race to acquire the most sophisticated security tools, many forget that the first line of defense is really the user.

Our Paul Mah has come up with a list of six simple ways that employees can enhance the security of their workstations. Be sure to check out Paul's full post on the subject at his blog.