Virtual PCs are the key to secure computing
For readers’ convenience, I’d like to summarise the long list of present best practices in client-system security implemented by all InfoWorld US readers.
When you sit down at a client computer that’s not hooked into a locked-down corporate network, there’s a drill. There are email rules that block potentially hazardous attachments, including JPEGs and Office documents.
[ Read more ]