This is a dedicated watch page for a single video.
You are the Information Security Manager of HDA Inc. You are addressing social engineering risks and seeking the most effective measure to reduce the likelihood of an unauthorized individual gaining access to computing resources. What is the MOST probable approach?