Watch this video on YouTube
After taking isolation and containment measures for a compromised computer, what should be the most appropriate next step for information security management?