• BearOfaTime@lemm.ee
      link
      fedilink
      English
      arrow-up
      4
      ·
      22 days ago

      The defense is first, proper security and training for people who have access.

      Followed by proper backups, which should be isolated and duplicated enough to provide resilience to such issues.