Joe, a technician, receives notification that a share for production data files on the network is encrypted. Joe suspects a crypto virus is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user’s computer.
Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?
- Educate the end user on safe browsing and email habits.
- Scan and remove the malware from the infected system.
- Create a system restore point and reboot the system.
- Schedule antivirus scans and perform Windows updates.