- When connecting to cloud service, is HTTPS or other secure means used to communicate authentication?
- Is there a secure email method being used to ensure that confidential information sent via email remains confidential?
- Is logging turned on, reviewed, and used to generate alerts for anomalous events?
- Is DNS resolution performed by secure DNS servers?
- Is DNS hosts file correctly configured?
- If the system is a mobile computer, is data encrypted?
- If removable media is used, is it encrypted?
- Are your end-user education documents up to date and cover the most likely attack vectors, including client-side threats, HTTP-based malware, and crimeware?
While there may not be any guaranteed protection against PC security threats today, taking the time to cover this checklist will save you many hours of future troubleshooting headaches.
This story, "Your handy PC security checklist," was originally published at InfoWorld.com. Keep up on the latest developments in network security and read more of Roger Grimes' Security Adviser blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.