Quick idea. Many breach reports list the sources for identifying the breach. Like, a user calls the help desk. Or perhaps, the Intrusion Detection System (IDS) lights up. Let’s use these communication channels in our incident response planning.
Watch more videos on my YouTube channel.
Posted by