Destructive malware has the capability to target a large scope of systems, and can potentially execute across multiple systems throughout a network. As a result, it is important for an organization to assess their environment for atypical channels for potential malware delivery and/or propagation throughout their systems. Systems to assess include: Enterprise Applications – particularly those which have the capability to directly interface with and impact multiple hosts and endpoints. Common examples include Patch Management Systems, Asset Management Systems, Remote Assistance software (typically utilized by the corporate Help Desk), Anti-Virus, Systems assigned to system and network administrative personnel, Centralized Backup Servers, and Centralized File Shares. While not applicable to malware specifically, threat actors could compromise additional resources to impact the availability of critical data and applications. Common examples include: Centralized storage devices Potential Risk – direct access to partitions and data warehouses; Network devices Potential Risk – capability to inject false routes within the routing table, delete specific routes from the routing table, or remove/modify configuration attributes - which could isolate or degrade availability of critical network resources.