eTOM: Does the exploit allow an intruder access into other sensitive systems?

Passwords on compromised systems and systems that regularly interact with the compromised system should also be changed as part of the remediation phase.

Want to check how your eTOM Processes are performing? You don’t know what you don’t know. Find out with our eTOM Self Assessment Toolkit: