This is a dedicated watch page for a single video.
You are auditing a company, and during the audit, you discover that employees are permitted to connect their personal devices to company-owned computers. As an auditor, what is the most effective method to validate that adequate security controls are implemented to prevent data loss?