Before establishing a security program, organizations should __________.
a. conduct a basic risk analysis
b. use a co-location facility
c. check temperature and humidity levels
d. recycle or donate used computing devices