A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?
sujon_london
Highly Voted 8 months, 2 weeks agoJT4
7 months, 4 weeks agovitasaia
Highly Voted 3 months, 1 week agoscoobysnack209
Most Recent 3 days, 1 hour agoshady23
1 week, 1 day agospearous
1 week, 5 days agoGeronemo
3 weeks, 1 day agorussian
3 weeks, 5 days agoadam.regula91
3 weeks, 6 days agomikzer
1 month ago_deleteme_
1 month, 1 week agops1hacker
1 month, 1 week agoMF757
1 month, 1 week agoID77
2 months, 2 weeks agomemodrums
2 months, 4 weeks agojohnabayot
3 months, 2 weeks agogr23
3 months, 2 weeks agoPayu1994
3 months, 2 weeks ago