A company wants to ensure that if any of its laptops are lost or stolen, data stored on them remains inaccessible to unauthorized users. Which of the following is the BEST method to achieve this?
Use database encryption for all company databases
Implement full-disk encryption on the laptops
Encrypt sensitive files individually on the laptops
Implement email encryption for company communications