You notice that a third-party application named “TaskSyncer Pro” has been granted OAuth access to the Google Workspace data of several employees. Upon investigation, you determine that the application has not been vetted by the IT department and could pose a security risk. How would you address this situation to ensure the integrity and security of your organization's data?