Watch this video on YouTube
In your role as an Information Security Manager, several incidents have come to your notice where external unauthorized entities accessed sensitive data on your network servers. What should be your immediate step in such a situation?