Watch this video on YouTube
An organization has identified a risk of unauthorized access to their internal systems due to weak user passwords. Which of the following risk mitigation strategies would be the most effective in addressing this scenario?