A company has issued laptops to its employees for business use. These devices are regularly used to access confidential client information and the company's internal network. To enhance the security of these devices, what is the MOST effective method to ensure that only authorized personnel can access the laptops?
Using screen locks
Enabling USB port locking
Implementing full device encryption
Applying geofencing policies