Juanita is the Chief Information Security Officer (CISO) of ThorTeaches.com, with operations in several different countries. ThorTeaches.com is currently in the process of implementing a new security system that will protect against data breaches and cyber-attacks. However, she has received reports from her team that there have been several instances of employees accessing sensitive data without the proper authorization. What should she do to address this issue?