What are two (2) types of user controls that can help prevent insider threats?
a. Implement high-availability (HA) systems
b. Prevent weak or careless password usage
c. Deploy WORM (Write Once Read Many) disks
d. Implement encrypted solid-state drives (SSD)
e. Implement intrusion detection Systems (IDS)
d. Train in phishing and vishing attacks