realitista@lemmy.world to Comic Strips@lemmy.world · 1 year agoI'm in!lemmy.worldimagemessage-square79linkfedilinkarrow-up11.31Karrow-down119file-text
arrow-up11.29Karrow-down1imageI'm in!lemmy.worldrealitista@lemmy.world to Comic Strips@lemmy.world · 1 year agomessage-square79linkfedilinkfile-text
minus-squareKISSmyOSFeddit@lemmy.worldlinkfedilinkarrow-up13·1 year agoTo find out if nuking that one workstation is enough or if you have to take more drastic measures.
minus-squareEmerald@lemmy.worldlinkfedilinkarrow-up4·1 year agoI feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
minus-squareKISSmyOSFeddit@lemmy.worldlinkfedilinkarrow-up7·1 year agoAnd then get ransomwared a bit later.
minus-squareJasonDJ@lemmy.ziplinkfedilinkarrow-up2·11 months agoYeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
To find out if nuking that one workstation is enough or if you have to take more drastic measures.
I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
And then get ransomwared a bit later.
Oh yeah probably
Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.