The security team at XYZ Corporation is conducting a routine audit of the company's wireless technologies. They have identified the use of Bluetooth-enabled devices in several departments for sharing files and syncing personal devices with company laptops. Which of the following would be the MOST effective mitigation technique to reduce the risk of a potential security breach due to these Bluetooth connections?
Disabling Bluetooth when not in use
Requiring periodic password changes for Bluetooth devices
Restricting Bluetooth use to off-business hours
Implementing stronger encryption for Bluetooth communications