Conduct an evaluation to identify the different tools, software, and apps that personnel are using for their get the job done. This incorporates both of those Formal tools furnished by the organization and any unofficial tools that folks can have adopted. Select tools that have sturdy stability measures and follow stringent privateness norms.