This is a dedicated watch page for a single video.
While reviewing your organization's cloud-based customer database, you've detected suspicious activity that might indicate unauthorized access. As the lead security manager, what would be your INITIAL course of action to address this situation?