Attackers commonly use stolen login qualifications to study protected data files or steal the data while it is in transit in between two network devices. Use Repeated backups. You need to usually back again up and encrypt your details. In the occasion of a ransomware attack, theft, or decline https://ieeexplore.ieee.org/document/9941250