Which of the following actions is most likely to grant unauthorized individuals the ability to access sensitive information in a computer system?
A) Implementing strong passwords and encryption protocols
B) Utilizing multi-factor authentication mechanisms
C) Disabling user account permissions and access controls
D) Regularly updating and patching software systems