Home Malware How SOCs Close a Critical Risk in 3 Steps