Incident Response Plan | Roadmap to Securing Your Infrastructure
Linux Academy
MAY 13, 2019
Good, since we’re all on the same page, why is this such a bad situation? When isolating infected workstations, they should be left powered on with the network cables removed and all network adapters disabled within the operating system. (Technician starts googling “what to do when a ransomware infection occurs.”).
Let's personalize your content