Virus infiltration and hacker attacks are becoming near-daily occurrences for many networks. When a potentially damaging incident befalls your network, do you know what to do? One major area of focus should be on creating accurate documentation at the time of incident notification. Include this Info-Tech incident log form in your incident response arsenal.
Incident Log Form
1 Download
Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.