An information security manager discovers that newly hired privileged users are not taking necessary steps to protect critical information at their workstations. Which of the following is the BEST way to address this situation?
A. Communicate the responsibility and provide appropriate training.
B. Publish an acceptable use policy and require signed acknowledgment.
C. Turn on logging and record user activity.
D. Implement a data loss prevention (DLP) solution.
A. Communicate the responsibility and provide appropriate training.
B. Publish an acceptable use policy and require signed acknowledgment.
C. Turn on logging and record user activity.
D. Implement a data loss prevention (DLP) solution.