During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor ' s BEST recommendation to help prevent unauthorized access?
Submit