The first step is to act quickly: Contain the breach by securing systems to prevent further access, then immediately notify ...