@[email protected] to Comic [email protected] • 2 months agoI'm in!lemmy.worldimagemessage-square74fedilinkarrow-up11.3Karrow-down118file-text
arrow-up11.28Karrow-down1imageI'm in!lemmy.world@[email protected] to Comic [email protected] • 2 months agomessage-square74fedilinkfile-text
minus-square@[email protected]linkfedilink13•2 months agoTo find out if nuking that one workstation is enough or if you have to take more drastic measures.
minus-square@[email protected]linkfedilink4•2 months agoI feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
minus-square@[email protected]linkfedilink2•2 months agoYeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
To find out if nuking that one workstation is enough or if you have to take more drastic measures.
I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
And then get ransomwared a bit later.
Oh yeah probably
Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.