Corrupted files can be backed up and stored.
Keeping systems patched, Effective anti-virus, proper user permissions and user training mitigate the threat and or the damage.
Its also simple enough to setup a honeypot directory on the main shares and write a script to monitor/shutdown/notify IT if any user accounts alter one of these files.