Be the first to like this
6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?
A. Poor security policies and procedures
B. Lack of due diligence
C. Downstream liability
D. Poor service-level agreements