1. Antivirus Software
Viruses, worms and Trojan horses are common types of malicious code designed to hide within files or programming, only to self-replicate or multiply through actions of unknowing computer users. The most important step to combat malicious code: install antivirus software to scan for and detect viruses, and to repair virus-related damage. Install the software at your gateway, e-mail servers, client desktops and on mobile devices. Configure your antivirus software to boot automatically and update often.

2. Firewalls
An effective firewall is your first line of defense against hackers. They examine messages and block those that do not meet specified LTN-Security criteria.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]