Laptops | Optimize

TechRepublic Power Checklist: Configuring a Laptop for Mobile Use

Does your company have a mobile workforce? Does your company have even a single employee who carries a laptop to and from home? When it comes to identity theft as a result of the theft of a laptop, there are specific things you can do to mitigate the risk that your company's (or, more importantly, your customers') sensitive information won't end up on the black market and put you in the papers as "the next great identity heist." This Power Checklist walks you through some of the things you should be aware of when securing devices for mobile users.

Format:
PDF
Size:
0 KB
Version:
Date:
Aug 2006
Author:
Tech Pro Research
Topic:
Laptops

Download Now

Not a Tech Pro Research member?
Sign up for a Free Trial and get access
to Tech Pro Research for one week.

People who downloaded this also downloaded