Watch this video on YouTube
Which of the following deficiencies identified during a review of an organization’s cybersecurity policy should be of MOST concern?