Watch this video on YouTube
As an IS auditor, you have identified several vulnerabilities within an organization's network infrastructure. What is the most appropriate next step?