What needs to be done after a cyber attack

What needs to be done after a cyber attack. In the previous article (here and here), we have discussed a way to identify that our system was attacked by somebody, either the attack was successful or not. next question is What needs to be done after a cyber attack / during the attack (if you know its currently happening where you are watching what they are doing through the log file). (more…)...
Read More