Defending from malware attacks starts below Some areas of this posting are sourced from: www.itpro.co.uk