A small IT security form has an internal network composed of laptops, servers, and printers. The network has both wired and wireless segments and supports
VPN access from remote sites. To protect the network from internal and external threats, including social engineering attacks, the company decides to implement stringent security controls. Which of the following lists is the BEST combination of security controls to implement?
Comments