How to Configure Internet Explorer to Stay Secure Online

With assistance from the United States Computer
Emergency Response Team (US-CERT), this slideshow will walk you through the
steps to configure Microsoft’s Internet Explorer to limit the damage from
hacker attacks.  Keep in mind that, in some cases, these recommended
settings may interfere with normal usage of some applications.

Note that menu options may vary
between versions of IE, so you should adapt the steps below as appropriate.

With assistance from the United States Computer
Emergency Response Team (US-CERT), this slideshow will walk you through the
steps to configure Microsoft’s Internet Explorer to limit the damage from
hacker attacks.  Keep in mind that, in some cases, these recommended
settings may interfere with normal usage of some applications.

Note that menu options may vary
between versions of IE, so you should adapt the steps below as appropriate.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.