ethical-hacker video for your company has been contracted by a bank to conduct a security assessment on their network following a recent data breach. The
Your company has been contracted by a bank to conduct a security assessment on their network following a recent data breach. The intruder successfully obtained financial data by compromising a single server. Given this scenario, what would be one of your primary recommendations to the bank?