What security measure could the IT team implement in the tech company to control access effectively and minimize the risk of unauthorized activities?
a) Two-factor authentication
b) Firewalls
c) Encryption
d) Virtual private network (VPN)