| Policy: |
| 1. Understand the threat, manage the risk and eliminate the root cause. |
| 2. Eliminate the need for application programs to be downloaded and patched. |
| 3. Fully automate the patching of system software and stop all other patching. |
| 4. Provide professional Business Message Services to replace public email services so business data cannot be leaked. |
| 5. Use many single purpose computing devices rather than general purpose computers. |
| 6. A computer used for email must not be used for browsing or any other purpose. |
| 7. A computer used to process business data must not be used for email or browsing. |
| 8. Re-image every computer back to factory settings every few months. |