Watch this video on YouTube
As the head of an information security team, your company has recently experienced a cyber attack that exploited a previously unidentified vulnerability. What would be the MOST effective action to prevent future attacks of a similar nature?