I’ve seen attacks occur without so much as a blip in resource monitoring. The most reliable monitoring for hacking is through network tools. It’s amazing what the Chinese and Russians try to do against your average network on a daily basis.
I’s talking about sofwere injuneerin. The wildcat wants to get loose, so you put ‘im in a cage. Simple no? HiTech