A recent information security risk assessment identified weak system access controls on mobile
devices as a high me In order to address this risk and ensure only authorized staff access company
information, which of the following should the organization implement?
B
Bis correct