Join us on Discord!
An unauthorized change has been detected on an information system within your organization. What is the first step you should take in response to this situation?