Watch this video on YouTube
An organization's critical business system has been compromised by a malicious attacker who has installed malware that allows remote access to the system. Which of the following is the most appropriate response to this incident?