This is a dedicated watch page for a single video.
During a routine security audit, an IS Auditor discovers multiple failed login attempts on a critical server's log files, indicating a potential hacking attempt. What should be the IS Auditor's immediate response?