A company is experiencing a large number of attempted network-based attacks against its online store. To determine the best course of action, a security analyst reviews the following logs.
Which of the following should the company do NEXT to mitigate the risk of a compromise from these attacks?
e020fdc
Highly Voted 8 months, 3 weeks ago041ba31
Most Recent 5 months, 1 week agoElDirec
9 months agonuel_12
11 months, 3 weeks ago