Watch this video on YouTube
As the lead of the Information Security division, there's feedback indicating that a newly deployed security measure is inadvertently obstructing operational workflows. What's your initial approach to this feedback?