A technician has responded to a security issue with an employee’s computer.
Which of the following basic forensic steps should be taken NEXT?
A.
Secure the area
B.
Initiate Data collection
C.
Create the forensics report
D.
Verify the chain of custody