An organization is assessing its IT risks and identifies a potential threat from an outdated software component. However, the business impact of this threat is deemed to be very low. What might be a suitable course of action?

  • Continuously monitor the threat and assess its potential impact.
  • Ignore the threat since it has a low business impact.
  • Immediately replace the outdated software to eliminate the threat.
  • Isolate the outdated software to minimize the risk.
When dealing with a low-impact threat from outdated software, it's typically suitable to continuously monitor the threat and assess its potential impact. This approach allows for a balanced allocation of resources to manage risks effectively.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *