realitista@lemmy.world to Comic Strips@lemmy.world · 2 years agoI'm in!lemmy.worldimagemessage-square77fedilinkarrow-up11.31Karrow-down119file-text
arrow-up11.29Karrow-down1imageI'm in!lemmy.worldrealitista@lemmy.world to Comic Strips@lemmy.world · 2 years agomessage-square77fedilinkfile-text
minus-squareEmerald (she/her)@lemmy.worldlinkfedilinkarrow-up8arrow-down1·2 years agoWhy would you be doing digital forensics?
minus-squareKISSmyOSFeddit@lemmy.worldlinkfedilinkarrow-up13·2 years agoTo find out if nuking that one workstation is enough or if you have to take more drastic measures.
minus-squareEmerald (she/her)@lemmy.worldlinkfedilinkarrow-up4·2 years agoI feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
minus-squareKISSmyOSFeddit@lemmy.worldlinkfedilinkarrow-up7·2 years agoAnd then get ransomwared a bit later.
minus-squareJasonDJ@lemmy.ziplinkfedilinkarrow-up2·2 years agoYeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.
Why would you be doing digital forensics?
To find out if nuking that one workstation is enough or if you have to take more drastic measures.
I feel like most companies wouldn’t bother with all that. They’d probably just nuke the workstation and call it a day.
And then get ransomwared a bit later.
Oh yeah probably
Yeah no. You gotta do due diligence. Getting one system compromised isn’t enough. The whole point is to pivot, elevate, repeat.