ACCT 4210 Watch a 6-minute video and answer 3 discussion questions

  • Companies like yours – YouTube
  • How did the hackers obtain access?
  • What controls could have been implemented to prevent the attack from occurring?
  • What were the consequences of the attack?