Which of the following countermeasures can you implement to help reduce technology-associated insider threats?
a.Prevent unauthorized data access
b.Keep unauthorized software from secure environments
c.Use strong passwords
d.Take security training courses