Cybersecurity: incident occurs
•Searching across the email gateway should be quickly conducted to identify other, possibly unopened, emails sitting in employee’s mailboxes. These emails should be immediately extracted and purged.
•Isolate the infection computer.