An analyst is responding to an incident involving an attack on a company-owned mobile device that was being used by an employee to collect data from clients in the field. Malware was loaded on the device via the installation of a third-party software package. The analyst has baselined the device. Which of the following should the analyst do to BEST mitigate future attacks?
sh4dali
Highly Voted 2 years, 7 months agoskibby16
Most Recent 1 year, 6 months agoTrick509
1 year, 9 months agoskibby16
1 year, 6 months agoMrRobotJ
2 years, 5 months ago2Fish
2 years, 2 months agoamateurguy
2 years, 7 months ago