A security breach has occurred in which a third party was able to obtain and misuse legitimate authentication information. After investigation, you determined that the specific cause for the breach was that end users have been placing their passwords underneath their keyboards. Which step will best help you resolve this problem?
A.
Discipline specific end users as object lessons to the rest of the staff and reset passwords on all systems immediately.
B.
Change all passwords on the company servers immediately and inform end users that their passwords will be changing on a regular basis.
C.
Set passwords to expire at specific intervals and establish mandatory continual training sessions.
D.
Inform end users that their passwords will be changing on a regular basis and require more complex passwords.