During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser.
Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?
Swallows
1 month agoDeeplaxmi
1 year, 10 months agoZephaniah
1 year, 10 months ago