cism video for during an audit of a data center's IT architecture, the information security manager uncovers the absence of necessary encryption for data
During an audit of a data center's IT architecture, the information security manager uncovers the absence of necessary encryption for data communications. What is the NEXT step to be taken?