Part 2 of a series: More tips to stymie cyber bad guys
In the event of a breach, take three actions: 1. prioritize data preservation (“it’s like a crime scene”) 2. forestall any restoration until the forensic investigation has been completed and 3. assess the status of your backup