RETIRED CONTENT

Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

Virus infiltration and hacker attacks are becoming near-daily occurrences for many networks. When a potentially damaging incident befalls your network, do you know what to do? One major area of focus should be on creating accurate documentation at the time of incident notification. Include this Info-Tech incident log form in your incident response arsenal.

Related Content

Hide Details

Search Code: 5708
Published: October 30, 2001
Last Revised: October 30, 2001

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.