ACCT 4210 Watch a 6-minute video and answer 3 discussion questions
- Companies like yours – YouTube
- How did the hackers obtain access?
- What controls could have been implemented to prevent the attack from occurring?
- What were the consequences of the attack?