Theme Description

Frequency

%

Reaction to cyberattacks

Secure physical access

12

85%

prevent additional data loss

5

35%

Conduct interviews

2

14%

Conduct forensics on the affected systems

8

57%

Systems strengthening

10

71%