Watch this video on YouTube
When a possible breach of an organization's IT system is reported, what should be the first action taken by the incident response manager?