Consider inter-office disk sharing. Do employees hand disks to one another and should this practice be restricted?
Infection can come from files attached to e-mail, Inadvertent spread of infection via inter-departmental exchanges. Consider using something such as Word Viewer, which is not capable of using macros, for viewing and printing Word documents. Consider using a format, e.g. .txt or .rtf that cannot carry macros. Intentional sabotage. Track all incidence of infection to its source and keep real-time virus protection active. Scan for viruses daily and tighten security. Eliminate any apprehension on the part of employees for reporting either real or suspected viruses. Scan, scan and scan. Even software that is purchased and packaged could be infected. Ascertain that you hardware (workstations, memory, processor power, and servers) will adequately support the AV software you have selected. Think about what or where is the weakest link in the chain in your company and strengthen it. Alert all necessary personnel of the incident. It is critical to determine if the infection has spread and, if so
Related Questions
- What is the risk associated with fast food restaurant employees handling money and food with no hand washing in between?
- Consider inter-office disk sharing. Do employees hand disks to one another and should this practice be restricted?
- Why do aikidoists practice striking with an open hand rather than a closed fist, which seems more practical?