Investigation should include research to identify threats to computer systems (e.g., spam, malicious software, theft) and methods for guarding against such threats, such as
- firewalls
- a regular backup schedule
- password protection
- data encryption
- end-point detection and response (EDR)
- manage detection and response (MDR)
- advanced mail security (AMS)
- advanced threat protection (ATP).