Watch this video on YouTube
What is the recommended course of action to address a situation where a core business unit relies on an outdated legacy system that poses a security threat to the enterprise network?