April 19, 2024
These policies made it easy to feel secure about having your sensitive data left in vehicles, travelling through airports and sitting in computer bags in the homes of your employees — after all, if you encrypt every device, you don’t have to worry about what data may have been stored on a device after it was stolen. The technology certainly lies within the financial and technical reach of organizations of all sizes, as it easily scales from a small business to a large enterprise.
Read the full article: Data encryption methods: securing emerging endpoints
Published in SearchSecurity on 04/01/10
Leave a Reply