A company recently converted most of the office laptops to connect wirelessly to the corporate network. After a recent high-traffic malware attack, narrowing the event to a specific user was difficult because of the wireless configuration. Which of the following actions should the company take?
AriGarcia
1 week ago