-By installing network security appliances to separate and scan all incoming and outgoing information to and from the organization.
-By keeping all software and operating systems patched and up to date at all times.
-By implementing a tight security policy throughout the network and performing regular checkups.