This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are auditing and have identified that a company executive is promoting employee use of social networking sites for business purposes. From the options provided, which recommendation would be the most effective in minimizing the risk of data leakage?