Why Is just sending a CIS log to the IT admin not enough to stop a malware attack on a printer?
It is possible that the CIS log becomes corrupted and cannot be trusted.
The IT admin may not be looking at the log and by the time they do, the attack already does its damage.
The CIS log is sent after an attack has taken place, and thus it does not prevent nor stop the attack.
The CIS log does not contain all the information needed to prevent the attack.
TESTED 13 May 2025