Watch this video on YouTube
What should an information security manager primarily do to prevent contract personnel from obtaining unauthorized access to sensitive information?