Refer to the Real World Case on endpoint security in the chapter. How do companies strike a…

Refer to the Real World Case on endpoint security in the chapter. How do companies strike a balance between providing users with access to the information they need in the form that is most useful to them, while at the same time enforcing adequate security? What issues should organizations consider when making this decision?