Choose the attack or malicious code that cannot be prevented or deterred solely through using technical measures.
Company intranet, newsletters, posters, login banners and e-mails would be good tools to utilize in a security: