During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser.
Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?
Swallows
3 months agoDeeplaxmi
2 years agoZephaniah
2 years ago