ThorTeaches.com has recently undergone an audit by a third-party IT security firm. The audit report identified several areas of concern with ThorTeaches.com's current IT security practices. Specifically, the report noted that ThorTeaches.com was not properly storing and tracking access logs for your systems and that ThorTeaches.com was not adequately protecting against insider threats. Which of the following measures should be implemented in order to address the issues identified in the audit report?