Which of the following is the MOST effective way to ensure information security policies are followed?
A. Require sign-off on acceptable use policies.
B. Require regular security awareness training.
C. Provide detailed security procedures.
D. Perform a gap analysis.
A. Require sign-off on acceptable use policies.
B. Require regular security awareness training.
C. Provide detailed security procedures.
D. Perform a gap analysis.