Watch this video on YouTube
Which action best exemplifies a proactive approach to cybersecurity risk management?