In order to have administrators and users recognize the importance and necessity of information security, and to prevent unauthorized access due to operational omissions and mistakes, implement and promote security-related training for administrators and users.
For example, implement promotion of security policies, formulation of training schedules, and formulation of training materials.