@realitista@lemmy.world to Comic Strips@lemmy.world • 8 months agoI'm in!lemmy.worldimagemessage-square79fedilinkarrow-up11.31Karrow-down119file-text
arrow-up11.29Karrow-down1imageI'm in!lemmy.world@realitista@lemmy.world to Comic Strips@lemmy.world • 8 months agomessage-square79fedilinkfile-text
minus-square@Emerald@lemmy.worldlinkfedilink4•8 months agoI feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
minus-square@KISSmyOSFeddit@lemmy.worldlinkfedilink7•8 months agoAnd then get ransomwared a bit later.
minus-square@JasonDJ@lemmy.ziplinkfedilink2•8 months agoYeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
And then get ransomwared a bit later.
Oh yeah probably
Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.