This is a dedicated watch page for a single video.
An internal survey reveals that many employees bypass certain security protocols claiming they are too restrictive and impact their productivity. How should you as the Information Security Manager handle this feedback?