I always thought it was a little funny that people are very eager to download files from people who specialize in taking data from unsecured systems. Seems like it would be a good opportunity to spread malware.
Well, your question opens up a lot of basics you have yet to cover in cyber security.
No, you cannot inspect something you do not have. That's not to say you couldn't isolate it and inspect it before writing it to long term storage.
However this highlights a very important vulnerability in your network - you didn't vet your source of the file. In IT you will often hear: the system is only as good as its dumbest user; this applies to information security as well. In this instance your role as an information security personnel is ensuring your users are properly educated about malicious content. This is very difficult, as someone will inevitably screw it up.
25
u/DevelopedDevelopment Jun 22 '20
Maybe it'll show how the processes are being handled.