An analyst is responding to an incident involving an attack on a company-owned mobile device that was being used by an employee to collect data from clients in the field. Malware was loaded on the device via the installation of a third-party software package. The analyst has baselined the device. Which of the following should the analyst do to BEST mitigate future attacks?
sh4dali
Highly Voted 2 years, 9 months agoskibby16
Most Recent 1 year, 8 months agoTrick509_111
1 year, 11 months agoskibby16
1 year, 8 months agoMrRobotJ
2 years, 7 months ago2Fish
2 years, 3 months agoamateurguy
2 years, 9 months ago