A company implemented a new cloud storage solution and installed the required synchronization client on all
company devices. A few months later a breach of sensitive data was discovered. Root cause analysis shows the data breach happened from a lost of personal mobile device. Which of the following controls can the organization implement to reduce the risk of similar breaches?
A. Biometric authentication
B. Cloud storage encryption
C. Application containerization
D. Hardware anti-tamper