realitista@lemmy.world to Comic Strips@lemmy.world · 6 months agoI'm in!lemmy.worldimagemessage-square33fedilinkarrow-up150arrow-down12file-text
arrow-up148arrow-down1imageI'm in!lemmy.worldrealitista@lemmy.world to Comic Strips@lemmy.world · 6 months agomessage-square33fedilinkfile-text
minus-squareEmerald@lemmy.worldlinkfedilinkarrow-up0·6 months agoWhy would you be doing digital forensics?
minus-squareKISSmyOSFeddit@lemmy.worldlinkfedilinkarrow-up0·6 months agoTo find out if nuking that one workstation is enough or if you have to take more drastic measures.
minus-squareEmerald@lemmy.worldlinkfedilinkarrow-up0·6 months agoI feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
minus-squareJasonDJ@lemmy.ziplinkfedilinkarrow-up1·6 months agoYeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
minus-squareKISSmyOSFeddit@lemmy.worldlinkfedilinkarrow-up1·6 months agoAnd then get ransomwared a bit later.
Why would you be doing digital forensics?
To find out if nuking that one workstation is enough or if you have to take more drastic measures.
I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
And then get ransomwared a bit later.
Oh yeah probably