Thought of the moment, inspired by this
here ("
80 GBytes of stored data improperly retained by TJX were transferred in this manner. TJX
did not detect this transfer."): are you sure that you, my dear reader, would have detected it on your network? Do you log all such activities and send the data to a
log management tool?
No comments:
Post a Comment