A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of access to cloud storage devices?
- the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software
- the unauthorized transfer of data containing valuable corporate information to a USB drive
- sensitive data lost through access to the cloud that has been compromised due to weak security settings
- intercepted emails that reveal confidential corporate or personal information