Cyber security
You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Describe how you would start this incident off correctly by properly protecting and securing the evidence on the laptop.