What is the preferred first step to take if an end user suspects that a desktop system has been compromised by an attacker?
Which of the following password policies will help secure employee desktop systems in case an employee’s password is stolen?