realitista@lemmy.world to Comic Strips@lemmy.world · 2 years agoI'm in!lemmy.worldimagemessage-square82linkfedilinkarrow-up11.31Kfile-text
arrow-up11.31KimageI'm in!lemmy.worldrealitista@lemmy.world to Comic Strips@lemmy.world · 2 years agomessage-square82linkfedilinkfile-text
minus-squareEmerald (she/her)@lemmy.worldlinkfedilinkarrow-up4·2 years agoI feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
minus-squareJasonDJ@lemmy.ziplinkfedilinkarrow-up2·2 years agoYeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
deleted by creator
Oh yeah probably
Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.