Policy: |
1. Understand the threat, manage the risk and eliminate the root cause. |
2. Eliminate the need for application programs to be downloaded and patched. |
3. Fully automate the patching of system software and stop all other patching. |
4. Provide professional Business Message Services to replace public email services so business data cannot be leaked. |
5. Use many single purpose computing devices rather than general purpose computers. |
6. A computer used for email must not be used for browsing or any other purpose. |
7. A computer used to process business data must not be used for email or browsing. |
8. Re-image every computer back to factory settings every few months. |