A company is experiencing a large number of attempted network-based attacks against its online store. To determine the best course of action, a security analyst reviews the following logs.
Which of the following should the company do NEXT to mitigate the risk of a compromise from these attacks?
e020fdc
Highly Voted 10 months, 2 weeks ago041ba31
Most Recent 7 months agoElDirec
11 months agonuel_12
1 year, 1 month ago