Mitigating malware effects on a machine 5

Describe the best practice to employ to mitigate malware effects on a machine 5