This is a dedicated watch page for a single video.
You are the IT risk manager at HDA Inc. When considering prevention measures against unauthorized retrieval of confidential information stored in a business application system, which option is MOST suitable?