Ad

Top Ten Tips for Protecting Corporate End Users

Based on results from the 2008 Corporate End User Study, Trend Micro advises both end users and businesses to observe the following precautions to avoid Web threats and address the increasing problem of data leaks to ensure a safer computing experience.

Following are some basic safety measures you and your children can implement together today particularly if your children are just beginning to explore the Internet:

1. To prevent data leaks and to combat increasing levels of Web threats, install a multi-layered strategy approach that locates security in the cloud before data reaches the gateway. Also protect data at the Internet gateway where the Internet connects to a corporate or Internet Service Provider network. Additionally, locate protections at the endpoint so data is analyzed on the user's PC or at the server.
2. Deploy vulnerability scanning software on the network and ensure all operating systems and other software applications are up-to-date and patched with the most recent security patches. Enable the "Automatic Update" feature in all users' operating systems, Web browsers, and applications.
3. Issue security policies and Internet usage guidelines on PC and laptop usage and mobile devices to control the information accessed.
4. Advise employees not to disclose sensitive information when receiving an email or telephone call. Banks and other institutions never call and request account information or Social Security numbers over the telephone or by email.
5. Develop corporate guidelines that advise against opening attachments or clicking on links contained in email messages from unknown senders. Also, train users to avoid installing files from unknown companies or organizations.
6. Educate end users about emerging threats and their consequences, emphasizing business-specific outcome such as a damaged reputation, lost customers, or regulatory fines.
7. Advise employees where they may or may not surf online. Many employees are unaware that Trojans and other malware can appear as blog comments and other code embedded on Web pages.
8. Prevent unnecessary protocols from entering the corporate network, such as P2P communication protocols and IRC.
9. Restrict user privileges for all network users. For example, kernel-level rootkits are implemented as device drivers; therefore, denying users the right to "load and unload device drivers" will largely block them.
10. To help protect mobile users on laptops, consistently update all systems and choose security products with in-the-cloud updates.