This is correct. Statistical data may be taken, check the serial/software/firmware versions for record keeping purposes.
Data download is what is important.
There is already proof the site may be compromised or under direct threat, so get the data and get out. Analyze either on secured equipment, off-site, or both.
IT Pede here.
This is correct. Statistical data may be taken, check the serial/software/firmware versions for record keeping purposes. Data download is what is important.
There is already proof the site may be compromised or under direct threat, so get the data and get out. Analyze either on secured equipment, off-site, or both.