Which of the following BEST enables staff acceptance of information security policies?
A. Strong senior management support
B. Adequate security funding
C. Computer-based training
D. A robust incident response program
A. Strong senior management support
B. Adequate security funding
C. Computer-based training
D. A robust incident response program