An IS auditor is reviewing an organization's implementation of a bring your own device (BYOD) program. Which of following would be the BEST recommendation to help ensure sensitive data is protected if a device is in the possession of an unauthorized individual?
A. Enable the location service feature on devices.
B. Encrypt data on devices including storage media.
C. Authenticate device users when accessing the corporate network.
D. Enable remote wiping of critical data.
A. Enable the location service feature on devices.
B. Encrypt data on devices including storage media.
C. Authenticate device users when accessing the corporate network.
D. Enable remote wiping of critical data.