Watch this video on YouTube
A company is implementing security controls for a new mobile application. Which of the following is the MOST important consideration when selecting the appropriate security controls?