It was a typical Monday morning for John, a software engineer at a mid-sized tech firm. As he sipped his coffee and settled into his cubicle, his computer beeped, signaling the arrival of a new email. The subject line read: "download-file-exe". John's instincts immediately kicked in, and he felt a shiver run down his spine. He had seen enough cybersecurity training videos to know that emails with suspicious subject lines like this were usually malicious.

Best regards, [Unknown Sender]"

"Dear User,

The IT team then worked on eradicating the malware from John's computer. They reformatted the hard drive, restoring the computer to its factory settings, and reinstalled the operating system. They also took the opportunity to update John's software and run a thorough virus scan to ensure the computer was clean.

The email had all the hallmarks of a phishing attempt or worse. John didn't recognize the sender's email address, and the attachment had a .exe extension, which was commonly used for executable files. He knew that downloading and running an executable file from an unknown source could compromise his computer and potentially spread malware throughout the company's network.

To prevent the malware from spreading, the IT team swiftly isolated John's computer from the rest of the network. They also issued a company-wide alert, warning employees about the suspicious email and advising them to be cautious when opening attachments from unknown sources.