Anti-Malware Policy
Contents 1
Introduction ............................................................................................................... 8
2
The malware threat .................................................................................................... 9
3
Anti-malware policy ................................................................................................. 11 3.1
Anti-malware software .............................................................................................. 11
3.2
Application installation .............................................................................................. 11
3.3
Application sandboxing .............................................................................................. 12
3.4
Software vulnerabilities ............................................................................................. 12
3.5
Threat awareness ...................................................................................................... 12
Version 1
Page 7 of 13
[Insert date]