This is a dedicated watch page for a single video.
John is a cybersecurity analyst at XYZ Corporation. Recently, he noticed several failed login attempts on a server. The attempts originated from the same IP address. What should John's first course of action be?