Learn the best practices that can help you better protect the computers on your network.
There are many steps you can take to protect your computers and network from Internet threats. Trend Micro recommends the following actions:
- Use the Trend Micro recommended WFBS default settings.
- Keep your operating systems and all software updated with the latest patches.
- Use strong passwords and advise your end users to use strong passwords.
A strong password should be at least 8 characters long and use a combination of upper and lower case alphabets, numbers, and non-alphanumeric characters. It should never contain personal information. Change your passwords every 60 to 90 days.
- Disable all unnecessary programs and services to reduce potential vulnerabilities.
- Educate your end users to:
- Read the End User License Agreement (EULA) and included documentation of applications they download and install on their computers.
- Click No to any message asking for authorization to download and install software (unless the end users are certain that they can trust both the creator of the software they are downloading and the website source from where they are downloading the software).
- Configure web browser settings that ensure a strict level of security. Trend Micro recommends requiring web browsers to prompt users before installing ActiveX controls. To increase the security level for Internet Explorer (IE), go to Tools > Internet Options > Security and move the slider to a higher level. If this setting causes problems with websites you want to visit, click Sites..., and add the sites you want to visit to the trusted sites list.
- If using Outlook, configure the security settings so that Outlook does not automatically download HTML items, such as pictures sent in spam messages.
- Prohibit the use of peer-to-peer file-sharing services. Internet threats may be masked as other types of files your users may want to download, such as MP3 music files.
- Periodically examine the installed software on the computers on your network. For more information about best practices for computer security, visit the Trend Micro Awareness and Prevention site.