Watch this video on YouTube
An unauthorized change has been detected on an information system within your organization. What is the first step you should take in response to this situation?