During an ongoing cyber incident, the security team has identified the source of the breach and patched the exploited vulnerability. What should be the next step to complete the remediation process?
Begin the recovery process by restoring services to normal operations.
Report the incident to senior management and prepare a detailed incident report.
Initiate monitoring to detect potential new incidents.
Re-evaluate affected systems for any remaining threats.