Watch this video on YouTube
During a routine security check, signs of an intrusion are detected on one of your servers. As the Information Security Manager, what should be the primary action to safeguard the network?