Mahko is the cybersecurity expert for his company. The company has told employees that they must use their personal devices for business purposes in order to save money. However, Mahko struggles with how some staff members use their personal devices on their own time. He is concerned they do not meet the company's acceptable use standards. Which vulnerability is most important for Mahko to address?