This summary provides an overview of the steps to take in response to a security violation where sensitive information may have been accessed or stolen at an organization:
1. Remain calm and follow the organization's security policy and incident response plan. Isolate the affected computer(s) by removing them from the network to prevent further access or transmission.
2. Notify the appropriate security personnel and provide any relevant information to help understand the nature and scope of the incident. Security experts can then investigate further and advise on additional containment and recovery actions.
3. Preserve evidence and logs from affected systems for later analysis by the security team. Their investigation will aim to determine how the security was breached and what data may