Be sure to configure your applications to block or disable any unnecessary or required features. For example, it is recommended to configure web browsers to block Flash, ads and Java while browsing the internet. Additionally, be sure to disable any features you aren’t...
It’s important that your system settings are set to block Microsoft Office macros from the internet, only allowing trusted macros with limited write access and with a digitally signed trusted certificate. Microsoft Office macros are an easy way for an attacker...
It’s important to run daily backups on any new and important data, when you change any software and configuration settings and retain these for at least three months. This will help you to access information if you are ever found to be compromised by a...
Ensure to patch operating systems and applications regularly and within 48 hours of any known exploit or vulnerability being discovered. Security vulnerabilities can be used to execute malicious code on vulnerable systems.
Ensure to use the principle of least privilege and restrict the use of admin privileges. It is imperative to ensure the practice of limiting access rights for users to the bare minimum permissions for them to perform their work.