1. All laptops and desktops should be running Windows 7. Windows XP will not be supported after May 2014. Also, they should be running some type of Anti-Virus software and laptops should be encrypted in case of the laptop being stolen. (Dell, 2011)
2. Patching the servers, desktops and laptops often. Most software applications have updates to their software for security updates. Microsoft sends out patches every second Tuesday of the month and should be tested on all platforms before sending out to the end users. Antivirus, local firewall and similar applications work to bar exploits and infections. Biometric and two-factor access security help prevent exposure of data. And file-based encryption keeps key information safe, even if it leaves the enterprise net and gets copied to portable media. (Dell, 2011)
3. Hardening servers, desktops, laptops and mobile devices through their configuration by turning off unused services. Constraining remote access and other convenience features; setting administrator and user identities; defining execution policy for required applications. …show more content…
Virtualize the browser so that the end users surf from the inside. Letting users manage their own browser can lead to trouble because they can download toolbars, plugins, etc. Which can have malware attached or leave them open to an attack. and to turning on features like password caching, forms-filling and history that can make a stolen PC a gateway to enterprise applications, mail and data. The answer to this is; now supported by some security-oriented edge network devices -- can be to supply users with a virtualized instance of a filtered standard browser. This strategy offers users a high level of assurance against commonplace attacks, and prevents even successful attacks from executing code, rooting the OS, or reaching and compromising the local file system or other vulnerable targets. (Dell,