As someone who deals with this sort of thing, for ransomware and other destructive intrusions, the first thing they go for is the backups themselves.
Companies that have an second backup copy that is seperate somehow so non-lateral movement isn’t possible are the ones that survive this level of breach.
Or they could just be stupid (cheap) and didn’t have any lol
As someone who deals with this sort of thing, for ransomware and other destructive intrusions, the first thing they go for is the backups themselves.
Companies that have an second backup copy that is seperate somehow so non-lateral movement isn’t possible are the ones that survive this level of breach.
Or they could just be stupid (cheap) and didn’t have any lol