This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are auditing an externally facing system that holds sensitive data. During the review, you find that the system has a configuration where users have either read-only or administrator rights, and it is noted that a majority of users have administrator access. In this situation, what is the greatest risk associated with this configuration?