« Back to Glossary Index

Usually, they enter an organization through a user-infected device introduced into the corporate network that delivers malware that can spread laterally. Threats can also come through an infected portable device or from users who were tricked into downloading and installing malicious software.

« Back to Glossary Index