Watch this video on YouTube
The MOST significant advantage arising from well-documented information security procedures is that: