cism video for after the release of a new product, there's a surge in customer data processing. As the Information Security Manager, you notice that the current
After the release of a new product, there's a surge in customer data processing. As the Information Security Manager, you notice that the current infrastructure may not adequately protect this increased data flow. What's your PRIMARY consideration?