A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus throughout the organization’s network. The business wants a better way to detect this type of activity. What should they replace their antivirus with, even though it costs more money?(1 point)
Responses
enforce a more strict email protection policy
enforce a more strict email protection policy
implement endpoint threat detection and response (ETDR)
implement endpoint threat detection and response (ETDR)
check that all firewalls are operational
check that all firewalls are operational
enable two-factor authentication (2FA)
1 answer
implement endpoint threat detection and response (ETDR)