Guidance for Defending Against Destructive Malware