An access management strategy, the tool involves requiring a secondary form of identification to allow access to sensitive information.
The process of assessing an organisations already existing cyber security measures to identify potential threats and vulnerabilities.