Watch this video on YouTube
Which of the following is often considered the weakest link in an organization's information security chain?