Step 7 - Covering Tracks
When a hack is complete, hackers will back out of the network while retaining their anonymity through a variety of ways. These range in severity from deleting log files to corrupting data such as the Master Boot Record which is the primary code required to start the Windows operating system in the startup process.
Protection: Take forensic images of IT systems and individual devices, backup all data and system configurations. Insure your company against a cyber attack.
Steve Mac Media Limited - 7592963
Trading Address: Marne House, 24 Mount Ephraim Road, Tunbridge Wells, Kent TN1 1ED
Registered Office: 90-92 King Street, Maidstone, Kent, ME14 1BH