An organization installed a new application server for IP phones. An automated process fetched user credentials from the Active Directory server, and the application will have access to on-premises and cloud services. Which security threat should be mitigated first?
TrainingTeam
6 months, 2 weeks agoDrVoIP
2 years, 2 months ago