(no title)
jeffmcjunkin | 2 years ago
The phrase to describe this is double extortion.
As for your question, https://www.cisa.gov/stopransomware is a decent start, but it's a complicated issue. In short, if a pentester can get inside your environment and gain privileges, so can an attacker. You want to slow down attackers enough to buy time for detection and response capabilities.
endisneigh|2 years ago
adolph|2 years ago
fbdab103|2 years ago