- Cleaning up after new and highly virulent worms means looking well beyond server systems—worms such as Nimda can infect clients through e-mail, network shares and Web pages.
- As Web services start to proliferate, responding to an intrusion or a worm may involve contacting partners who could lose access to a service or might have been compromised themselves.
- Use of disk-imaging software can make it especially easy to wipe and reinstall infected systems, although images must be kept diligently up-to-date.
- The war on terror means that administrators must be especially vigilant and should look for anything unusual in an attack. The Center for Internet Security recommends contacting the FBI about any intrusions.
Application Modernization: What Is It and How to Get Started