RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
Virus infiltration and hacker attacks are becoming near-daily occurrences for many networks. When a potentially damaging incident befalls your network, do you know what to do? One major area of focus should be on creating accurate documentation at the time of incident notification. Include this Info-Tech incident log form in your incident response arsenal.