- cross-posted to:
- [email protected]
- technology
- cross-posted to:
- [email protected]
- technology
Missing logs could make it more difficult to identify unauthorized access to the customers’ networks during that two-week window.
Missing logs could make it more difficult to identify unauthorized access to the customers’ networks during that two-week window.
Maybe they should have been backing them up to the clou— Oh, never mind.
Could have kept backups in S3!