Watch this video on YouTube
What is the PRIMARY factor most likely to necessitate a revision of the information security strategy?