An analyst receives an alert from the continuous-monitoring solution about unauthorized changes to the firmware versions on several field devices. The asset owners confirm that no firmware version updates were performed by authorized technicians, and customers have not reported any performance issues or outages.
Which of the following actions would be BEST for the analyst to recommend to the asset owners to secure the devices from further exploitation?
Laudy
Highly Voted 2 years, 10 months agoAbz1999
1 year, 9 months agoRobV
Most Recent 1 year, 6 months agosirpetey
1 year, 7 months agoBig_Dre
1 year, 10 months agonaleenh
1 year, 10 months agoheinzelrumpel
1 year, 11 months agoheinzelrumpel
1 year, 11 months agoNoragretz
1 year, 11 months agoJimmyJams
1 year, 11 months agotutita
2 years agokiduuu
2 years, 2 months ago2Fish
2 years, 3 months agoJacobmy98
2 years, 3 months agoIanRogerStewart
2 years, 4 months agoJacobmy98
2 years, 3 months agoJoInn
2 years, 1 month agoCock
2 years, 4 months agoStiobhan
2 years, 4 months agoknister
2 years, 5 months agolordguck
2 years, 7 months ago