Extract - A risk assessment of the Piql Preservation Service

9. Use antivirus / anti malware. Antivirus detects and blocks known malware which i.a exploits vulnerabilities in email applications and document readers. Preferably, one should use a product that can be centrally managed and that works well with the operating system. 10. Do not install more functionality than necessary. Any new application and function increases the possibilities of attack. Few users for example needs Java Runtime or JavaScript in Adobe Reader. Also, unnecessary software must be cured and updated, increasing the administrative burden on the system.

Page | 23

Made with FlippingBook flipbook maker