Your handy PC security checklist

If you're in charge of securing end-user systems at your organization, print out this security checklist and put it on standby

Page 2 of 2
  • When connecting to cloud service, is HTTPS or other secure means used to communicate authentication?
  • Is there a secure email method being used to ensure that confidential information sent via email remains confidential?
  • Is logging turned on, reviewed, and used to generate alerts for anomalous events?
  • Is DNS resolution performed by secure DNS servers?
  • Is DNS hosts file correctly configured?
  • If the system is a mobile computer, is data encrypted?
  • If removable media is used, is it encrypted?
  • Are your end-user education documents up to date and cover the most likely attack vectors, including client-side threats, HTTP-based malware, and crimeware?

While there may not be any guaranteed protection against PC security threats today, taking the time to cover this checklist will save you many hours of future troubleshooting headaches.

This story, "Your handy PC security checklist," was originally published at Keep up on the latest developments in network security and read more of Roger Grimes' Security Adviser blog at For the latest business technology news, follow on Twitter.

| 1 2 Page 2
From CIO: 8 Free Online Courses to Grow Your Tech Skills
View Comments
Join the discussion
Be the first to comment on this article. Our Commenting Policies