This is a dedicated watch page for a single video.
After a web server in a financial institution has been compromised using a super-user account, isolated, and subjected to appropriate forensic procedures, what should be the subsequent course of action?