Is there a loophole from which malicious software can enter your network?How would your monitoring devices react once the Trojan or virus has penetrated your network?How would your employees respond? How does your organization cope with the identified threat?How much time and effort is required to rectify and purge the threat?