Which practice can significantly reduce malware security incidents in an organization?

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

The practice of not opening files with .bat, .com, .exe, .pif, or .vbs extensions is particularly effective in reducing malware incidents within an organization because these types of files are commonly associated with executable code that can run scripts or programs. By avoiding these extensions, an organization significantly minimizes the risk of inadvertently executing malicious software that can lead to data breaches, system compromises, or network infections.

Executable files can contain hidden malware that activates once the file is opened, potentially causing serious damage. Injurious software can perform actions like information theft, network exploitation, or providing backdoor access to cybercriminals. Therefore, implementing a policy where employees are trained to recognize and avoid opening these risky file types is a proactive and essential step in bolstering an organization's cybersecurity posture.

In contrast, practices like opening all email attachments indiscriminately or enabling automatic download of attachments expose the organization to increased risk, as they could inadvertently lead to executing harmful software. Additionally, using weak passwords creates vulnerabilities in access security, making it easier for unauthorized users to gain access, which is a separate but equally important concern.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy