Investigation should include
- identifying risks
- theft of equipment or intellectual property
- loss or corruption of data through malicious software
- unauthorized entry into the computer system and/or applications
- accidental loss or corruption of data by a user or company
- identity theft
- identifying threats to computer systems such as
- spam
- malicious software
- hacking
- piracy
- identifying methods for guarding against threats such as
- malware protection software
- firewalls
- regular backups
- password protection
- data encryption
- software updates
- limiting access to devices and portable storage.