What should you do?
Which of the following security breaches might occur under the current IT and security practices?
Which two actions should you perform?