An organization installed a new application server for IP phones. An automated process fetched user credentials from the Active Directory server, and the application will have access to on-premises and cloud services. Which security threat should be mitigated first?
TrainingTeam
8 months agoDrVoIP
2 years, 4 months ago