This is a dedicated watch page for a single video.
When conducting a security review of organizational servers, it is discovered that a file server containing confidential HR data is accessible to all user IDs. What should be the first step taken by the security manager?