Transcript text: A security analyst has discovered a workstation infected with malware that has spread to other systems on the network. The analyst has determined that they cannot easily remove the malware cannot and that re-imaging the workstation is necessary. However, the workstation has important data that the analyst has not backed up. After re-imaging the infected workstation, what is the best practice to prevent future malware infections?