ACCT 4210 Watch a 6-minute video and answer 3 discussion questions
Companies like yours – YouTube
How did the hackers obtain access?
What controls could have been implemented to prevent the attack from occurring?
What were the consequences of the attack?