Which of the following should be the FIRST step in the incident response process for a suspected breach?
A. Inform potentially affected customers of the security breach.
B. Notify business management of the security breach.
C. Engage a third party to independently evaluate the alerted breach.
D. Research the validity of the alerted breach.
A. Inform potentially affected customers of the security breach.
B. Notify business management of the security breach.
C. Engage a third party to independently evaluate the alerted breach.
D. Research the validity of the alerted breach.