Watch this video on YouTube
During an audit of financial systems, an IT Auditor discovers a vulnerability that could potentially lead to unauthorized transactions and financial losses. What actions should the Auditor take to mitigate the risk?