This is a dedicated watch page for a single video.
As a cloud security analyst in a financial institution, you are evaluating the security posture of your cloud-based applications to mitigate the risk of data breaches. You are considering additional security measures to enhance the protection of sensitive customer data beyond what is currently implemented. Given the need to balance security with user convenience, which of the following measures would likely be the least effective in strengthening your cloud security posture against data breaches?