Virtual PCs are the key to secure computing
For readersí convenience, Iíd like to summarise the long list of present best practices in client-system security implemented by all InfoWorld US readers.
When you sit down at a client computer thatís not hooked into a locked-down corporate network, thereís a drill. There are email rules that block potentially hazardous attachments, including JPEGs and Office documents.
[ Read more ]