Which of the following is the best way of protecting important data against virus attack?