This document discusses managed IT solutions and malware. It begins with an introduction of Kyle Bisdorf, a 24-year-old lead security analyst with 7 years of experience. The document then defines malware and examples like rootkits, worms, and trojans. It asks if anyone has seen an infected computer and what they did to fix it. The document outlines steps to contain, eradicate, and recover from a malware infection and provides examples of tools to use like Sysinternals, MalwareBytes, and F-Secure Rescue CD. It concludes with advice to be careful online and use browser extensions and sandboxing for protection.