A company has issued laptops to its employees for business use. These devices are regularly used to access confidential client information and the company's internal network. To enhance the security of these devices, what is the MOST effective method to ensure that only authorized personnel can access the laptops?
Implementing full device encryption
Using screen locks
Applying geofencing policies
Enabling USB port locking