One Tech has a continuous monitoring program in place. They recently discovered a vulnerability in one of their information systems that could lead to a potential security breach. As part of their continuous monitoring strategy, what should One Tech do next?