Which of the following countermeasures can you implement to help reduce technology-associated insider threats?
Prevent unauthorized data access
Keep unauthorized software from secure environments
Use strong passwords
Take security training courses