Watch this video on YouTube
What is the priority action when a business discovers unauthorized access to its network has led to a data breach?