Step 7 - Covering Tracks
When a hack is complete, hackers will back out of the network while retaining their anonymity through a variety of ways. These range in severity from deleting log files to corrupting data such as the Master Boot Record which is the primary code required to start the Windows operating system in the startup process.
Protection: Take forensic images of IT systems and individual devices. Backup all data, system configurations. Insure your company against a cyber attack.