Charles leads a security team. One morning, he receives a risk summary email from Altitude Networks.
Suspiciously, the app can access all company files. The employee who authorized this app overlooked this detail.
Charles immediately notifies the employee of the risk, and asks her to uninstall the app.
The employee receives Charles' email and promptly uninstalls the app.