This is a dedicated watch page for a single video.
As the information security manager at HDA Inc., you are investigating the recent incident of data leakage from the newly purchased equipment. You noticed that there were no unusual activities and valid credentials were used. What could be the most likely reason for leakage?