Because emails are the most common path used for intrusions, it is time for security professionals to take proactive steps to minimize this threat.
For this discussion, identify one countermeasure an organization could take to minimize the exposure of this threat. Be sure to indicate the process of
implementing the countermeasure and the impact it would have on the organization as a whole.
Sample Solution