Watch this video on YouTube
During a security review, it is discovered that several employees have been bypassing security protocols to save time, leading to potential vulnerabilities in the IT environment. What should be the immediate response to address this issue?