TechRepublic Power Checklist: Configuring a Laptop for Mobile Use


  • Provided by TechRepublic Premium
  • Published August 20, 2006
  • Topic TechRepublic Premium
  • Format PDF
Does your company have a mobile workforce? Does your company have even a single employee who carries a laptop to and from home? When it comes to identity theft as a result of the theft of a laptop, there are specific things you can do to mitigate the risk that your company's (or, more importantly, your customers') sensitive information won't end up on the black market and put you in the papers as "the next great identity heist." This Power Checklist walks you through some of the things you should be aware of when securing devices for mobile users.

People Also Downloaded