Bonney’s system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
- Complaint to police in a formal way regarding the incident
- Turn off the infected machine
- Leave it to the network administrators to handle
- Call the legal department in the organization and inform about the incident