Watch this video on YouTube
A third-party application used by your organization recently suffered a zero-day exploit. As the Information Security Manager, which method would be MOST effective in addressing this threat?