this post was submitted on 12 Sep 2023
18 points (100.0% liked)

cybersecurity

3249 readers
2 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] SpaceMan9000@lemmy.world 1 points 1 year ago

The back-up procedure is usually written with systems breaking in mind, not a malicious actor trying to wreak havock.

A lot of times the back-ups machines are always connected (or easily discovered since they're always online) which allows an attacker to remove the back-ups too.