True. The source need to be legit tho, along with a chain of custody from the source person to the cyber team who looks at it
True. The source need to be legit tho, along with a chain of custody from the source person to the cyber team who looks at it