@realitista@lemmy.world to Comic Strips@lemmy.world • 8 months agoI'm in!lemmy.worldimagemessage-square79fedilinkarrow-up11.31Karrow-down119file-text
arrow-up11.29Karrow-down1imageI'm in!lemmy.world@realitista@lemmy.world to Comic Strips@lemmy.world • 8 months agomessage-square79fedilinkfile-text
minus-square@KISSmyOSFeddit@lemmy.worldlinkfedilink13•8 months agoTo find out if nuking that one workstation is enough or if you have to take more drastic measures.
minus-square@Emerald@lemmy.worldlinkfedilink4•8 months agoI feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
minus-square@KISSmyOSFeddit@lemmy.worldlinkfedilink7•8 months agoAnd then get ransomwared a bit later.
minus-square@JasonDJ@lemmy.ziplinkfedilink2•8 months agoYeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
Why would you be doing digital forensics?
To find out if nuking that one workstation is enough or if you have to take more drastic measures.
I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
And then get ransomwared a bit later.
Oh yeah probably
Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.