You are a cybersecurity analyst who has just collected a hard drive as evidence for a suspected data breach. What is the most important next step to ensure that the chain of custody is intact?
Scanning the hard drive for any signs of malware
Securing the hard drive in tamper-evident packaging
Transferring the hard drive to the forensic lab
Labeling the hard drive with the date and time of collection