The Acme Widgets Company is putting new controls in place for its accounting department. Management is concerned that a rogue accountant may be able to create a new false vendor and then issue checks to that vendor as payment for services that were never rendered. What security control can best help prevent this situation?
Chris is worried that the laptops that his organisation has recently acquired were modified by a third party to include keyloggers before they were delivered. Where should he focus his efforts to prevent this?