This is a dedicated watch page for a single video.
You have discovered a security vulnerability in a software application used company-wide. As the Information Security Manager, your initial risk assessment identifies this as a critical vulnerability. What should you prioritize?