A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?
sujon_london
Highly Voted 1 year, 10 months agoJT4
1 year, 9 months agovitasaia
Highly Voted 1 year, 5 months ago2d3d7b4
Most Recent 1 year agoscoobysnack209
1 year, 1 month agoshady23
1 year, 1 month agospearous
1 year, 2 months agoGeronemo
1 year, 2 months agorussian
1 year, 2 months agoadam.regula91
1 year, 2 months agomikzer
1 year, 2 months ago_deleteme_
1 year, 2 months agops1hacker
1 year, 2 months agoMF757
1 year, 3 months agoID77
1 year, 4 months agomemodrums
1 year, 4 months agojohnabayot
1 year, 5 months agogr23
1 year, 5 months ago