A manager at a publishing company received an email that appeared to be from one of her vendors with an attachment that contained malware embedded in an Excel spreadsheet . When the spreadsheet was opened, the cybercriminal was able to attack the company's network and gain access to an unpublished and highly anticipated book. Which of the following controls would be most effective to prevent such an attack?
Teri
3 months agoVallie
1 months agoTeri
1 months agoBrynn
1 months agoJaime
3 months agoTresa
2 months agoMaryanne
2 months agoChaya
2 months agoRoselle
2 months agoMarkus
3 months agoDevorah
3 months agoVanda
3 months agoLouisa
3 months agoChandra
3 months agoGeorgeanna
3 months agoAntonio
2 months agoJohnetta
2 months agoMargot
3 months agoShaunna
3 months ago