cism video for when conducting a security review of organizational servers, it is discovered that a file server containing confidential HR data is accessible to
When conducting a security review of organizational servers, it is discovered that a file server containing confidential HR data is accessible to all user IDs. What should be the first step taken by the security manager?