Suppose for a moment that a virus has infected your entire computer network. It has quickly spread through every employee’s workstation, into every document and database file. All your work, all your ...