Watch this video on YouTube
A business unit accepts the risk of implementing commercial software with weak password controls. What is the BEST course of action?