Watch this video on YouTube
As the information security manager, you're refining strategies to enhance the security of sensitive organizational data. From the following measures, which would be the MOST fitting to shield this sensitive data?