Watch this video on YouTube
The IT Governance Board is reviewing an audit report that highlights weak encryption protocols used to store sensitive customer data. What action should the board take FIRST?