LAB 13
As the IT specialists of an organization you should be aware of software programs such as VeraCrypt that allows users to create hidden volumes inside other files such as a picture or word document. We have talked about outsider threats and now covering insider threats. From the previous exercise an employee was suspected of saving client username and passwords. One obvious point – to find […]