A company's network has been breached, and sensitive customer data may have been compromised. What is the first step in documenting this incident?
Delete all related log files
Create a final incident report
Immediately contact law enforcement
Create a detailed initial report