Safe Computing 201

Safe Computing 201

Some of you may recollect reading an earlier blog entitled "Safe Computing 101", in which I discussed some ways in which viruses and malware can infect weakly protected systems.  An extension of this issue relates to things that users do that can exacerbate the problem.  Some examples of these are:


For the most  part, the above issues can be avoided by a combination of user training and user/machine specific restrictions.  For example devices can be disabled and drive files removed.  Physical changes to the computer are a bit extreme.

If you would like to insure that your system is properly protected, please contact the CCS Retail Systems Support Department to schedule a security review of your systems.
 

Exit mobile version