Which of the following best describes the strategy an organization should implement to actively reduce the potential impact of a security breach?
Transferring risk to a cyber insurance company
Choosing not to act on a known risk
Implementing stronger access controls
Accepting the potential impact of a security breach