A company has recently allowed employees to use their personal devices at work to enhance satisfaction and productivity. Which of the following security measures should be applied to effectively enforce network segregation for these devices?
Disable all unused network ports within the organization.
Implement a guest network for all personal devices.
Create a separate VLAN for personal devices used at work.
Implement time-based authentication for device access.