In the beginning there is often only a vague suspicion.
But what can I do when I feel that there are uninvited guests on my network?
The article in the magazine “kes” nr. 5 of October written by Martin Huber, responsible for client and network security provides help on how to deal with a suspicion: How can you establish a suspicion with lightweight tools? Where do you get the “Indicators of Compromise”?