This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are auditing the incident response process when an intrusion into an organization's network is detected and deleted. In this audit, what should be the initial step to take when such an intrusion is detected?