You are a cybersecurity analyst who has just collected a hard drive as evidence for a suspected data breach. What is the most important next step to ensure that the chain of custody is intact?
Transferring the hard drive to the forensic lab
Labeling the hard drive with the date and time of collection
Securing the hard drive in tamper-evident packaging
Scanning the hard drive for any signs of malware