Each time I try to update an old article about network intrusion detection systems, it gets tougher.
You come into work to discover that your Mac or server have been hacked, or appears to be under the control of an intruder. What do you do next?
For most, our firewall is the most robust protection between us and the Internet. But it is not just a case of set and forget.