A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt that data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?
eomsg001
Highly Voted 2 years, 4 months agoMundo
2 years, 2 months agoisaphiltrick
11 months, 4 weeks agoFOURDUE
Highly Voted 2 years, 4 months agoDjonzi
Most Recent 2 months, 3 weeks agoSteel16
4 months, 1 week agoDelab202
1 year, 5 months agoimather
1 year, 10 months agosplink
2 years, 3 months agoOneSaint
2 years, 4 months ago