In an effort to enhance security, a company has a stringent policy surrounding the connection of external storage devices to their network. Despite this, an employee managed to connect an unauthorized storage unit to a company workstation, leading to a data breach. To prevent such incidents in the future, what is the MOST effective mitigation technique to apply?
Physically disable the workstation ports meant for connecting peripheral storage devices.
Revise incident response protocols to include steps for managing breaches via external storage connections.
Implement a software solution to scan and detect unauthorized storage devices periodically.
Mandate regular training sessions to reiterate the importance of adhering to the external storage policy.