Use of strong passwords Use of anti-virus systems Regular update of operating system and other installed applications Regular backup of important files Use of encryption techniques and digital signatures Use of firewall and intrusion detection systems Following standard guidelines for internet activities Physical security of computing infrastructure Awareness of current security scenario and attack techniques
↧