Mobile Madness: Securing the endpoint

7
Anonymous Reader writes “Today’s computer networks have no boundaries. Their perimeters started moving a few years ago as road warriors began carrying their laptops to sales or work sites, logging in for customer information or critical construction plans and other necessary resources. Next, they spread to the wireless and broadband networks in hotel, airports and Starbucks, as traveling executives and managers started logging in to read their e-mail or access year-end data for tomorrow’s big meeting.”

Link: it-observer.com

Category:

  • Security