Theme Description | Frequency | % | |
Reaction to cyberattacks | Secure physical access | 12 | 85% |
prevent additional data loss | 5 | 35% | |
Conduct interviews | 2 | 14% | |
Conduct forensics on the affected systems | 8 | 57% | |
Systems strengthening | 10 | 71% |