During an ongoing cyberattack on your organization's network, you notice that multiple critical servers have been compromised and sensitive data has been exfiltrated. What is the primary impact of this incident?
Financial loss due to operational downtime
Increase in IT support costs
Unauthorized access to network resources
Data exfiltration, leading to financial and reputational damage