A healthcare organization uses a centralized identity management system for user authentication and authorization. The system supports single sign-on (SSO) and multi-factor authentication (MFA). Recently, the security team identified multiple incidents of unauthorized access attempts. During the investigation, it was discovered that compromised user credentials were being used.
Which of the following actions would be MOST effective in mitigating this threat?
A) Implement behavioral biometrics for continuous authentication.
B) Require password complexity and regular password changes.
C) Implement adaptive access controls based on user behavior and risk scoring.
D) Conduct a company-wide security awareness training on phishing prevention.