You receive an email from an outside party stating that clients on your network have been encrypted and the only way to decrypt them is to send Bitcoins to a hacker named Zero Cool
. Your company has fallen victim to a/an:
Operating Systems | |
Security | |
Software Troubleshooting | |
Operational Procedures |