A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus throughout the organization’s network. The business wants a better way to detect this type of activity. What should they replace their antivirus with, even though it costs more money?
A. enable two-factor authentication (2FA)
B. enforce a more strict email protection policy
C. implement endpoint threat detection and response (ETDR)
D. check that all firewalls are operational