• BearOfaTime@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    ·
    4 months ago

    The defense is first, proper security and training for people who have access.

    Followed by proper backups, which should be isolated and duplicated enough to provide resilience to such issues.