Watch this video on YouTube
During a routine IT asset audit, you discover that several employees are using unauthorized software applications on their work computers. What action should you take first?