Watch this video on YouTube
You are the Information Security Manager of HDA Inc. You receive feedback from end users that newly implemented security controls are perceived as overly restrictive. What is the initial step you should take?