This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are performing a control assessment as a response to a security breach that occurred as a result of a hacker taking use of a well known vulnerability for which a patch was released by the manufacturer. What would be your BEST course of action?