For readers’ convenience, I’d like to summarise the long list of present best practices in client-system security implemented by all InfoWorld US readers.
When you sit down at a client computer that’s not hooked into a locked-down corporate network, there’s a drill. There are email rules that block potentially hazardous attachments, including JPEGs and Office documents.
Firewalls are cranked up to maximum vigilance, getting clearance for every attempt by every application to open an outbound TCP/IP connection. Antivirus software runs constantly and stays constantly updated. You set aside temporary mail accounts for use in forums, Usenet posting and online shopping to avoid phishers and spammers.Read Full Story