During an adversarial simulation exercise, an external team was able to gain access to sensitive information and systems without the organization detecting this activity. Which of the following mitigation strategies should the organization use to best resolve the findings?
vicbersong
1Â month, 2Â weeks agovicbersong
1Â month, 2Â weeks agoPmonty4
2Â months, 2Â weeks ago