Yesterday I posted a new article in the reading room of the Realtime IT Compliance site about the need for securing mobile computing devices and mobile storage media, "Managing Mobile Computing Risks." Within it you will find a partial (but still pretty lengthy) listing of the laptop theft and loss events I’ve been accumulating. There are also several pointers for securing these mobile devices, along with some awareness recommendations. People are the weakest link in your mobile computing device security strategy; they literally hold security within their hands. With the increase in incidents involving mobile computing devices, you must educate them about how to protect these devices.
For additional information about mobile computing security, see another article published today on SearchSecurity.
Technorati Tags
information security
mobile computing
encrypt
stolen laptops