During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser.
Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?
- Utilize strong anti-malware controls on all computing devices.
- Implement an intrusion detection system (IDS).
- Update security policies and procedures.
- Implement multi-factor authentication.
Reveal Solution Next Question