| http://www.w3.org/ns/prov#value | - Install auditing tools for your system so that if there is a successful attack you can have a record of what to fix.Most importantly, store as little sensitive information, and do as little sensitive business as possible on a machine that leaves your house (like a laptop), or connects to the intern
|