Cyber Security

Scoping a penetration test

May 24, 2018

What if you were the victim of a more sophisticated ransomware attack that stole your application source code? In this post we explore five things you can do to protect yourself against this kind of cyber attack