TechRepublic Power Checklist: Configuring a Laptop for Mobile Use

Does your company have a mobile workforce? Does your company have even a single employee who carries a laptop to and from home? When it comes to identity theft as a result of the theft of a laptop, there are specific things you can do to mitigate the risk that your company’s (or, more importantly, your customers’) sensitive information won’t end up on the black market and put you in the papers as “the next great identity heist.” This Power Checklist walks you through some of the things you should be aware of when securing devices for mobile users.

Resource Details

or

* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.

Provided by:
TechRepublic Premium
Published:
August 20, 2006
Topic:
TechRepublic Premium
Format:
PDF
or

* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.