In part one of this blog James Cockayne looked at what might happen to a DB2 database that was attacked by ransomware encryption.
In part two James shares four dos and four don’ts to help protect DB2 databases from ransomware attacks.
https://www.triton.co.uk/ransomware-and-the-db2-database-part-two/