![]() Then you work on a reaction plan for the next time. Find out how a malicious user was able to social engineer their way into your users PCs and why it took 15mins for them to figure out 'something was wrong'. You have an educational moment with your users here. Do not trust that the malicious user was unable to install even a root kit at this point.Īfter that, and more, is done.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |