Watch this video on YouTube
In the provided real-world example, what compensating controls were implemented when encryption was not possible for a legacy system?