Project 1 Developa SecurityPolicyandTestingPlan Your organization was recently attacked with a malicious virus that originated from a file downloaded by an employee from an email that appeared to come from a coworker. The employee immediately contacted information technology (IT) once he noticed that the download was malicious. The chief executive officer (CEO) now wants to […]