![]() ![]() ![]() Verify that all installed programs are legitimate and not pirated software, which could be filled with bloat and malware. Installed programs should be reviewed then the unneeded deleted. These programs expand the attack surface and become potential points of entry for attackers. Make sure to turn off your system’s wireless internet and unplug its Ethernet connection Clean up unwanted programsĮven in fresh installations of Windows 10, a system likely has unnecessary programs installed. Create or locate a suitable installation media for your Windows 10 system (a trusted USB drive, preferably). Previously used systems may have malware, spyware and who knows what else from web browsing, and pre-installed systems may contain an absurd amount of bloatware. ![]() It is strongly recommended that Windows 10 be installed fresh on a system. Hardening is an integral part of information security and comprises the principles of deter, deny, delay and detection (and hardening covers the first three). It is based on the principle of least privilege, or to configure a computer system to only do what you do normally and nothing more. Hardening refers to reducing the attack surface that attackers have available to them. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |