A company has issued laptops to its employees for business use. These devices are regularly used to access confidential client information and the company's internal network. To enhance the security of these devices, what is the MOST effective method to ensure that only authorized personnel can access the laptops?
Implementing full device encryption
Enabling USB port locking
Applying geofencing policies
Using screen locks