Robert Siciliano » Blog

Thursday, May 02, 2013

5 Steps to Securing Portable Devices

If it’s portable, it is subject to being lost or stolen—and the data contained can be accessed or the applications running may have access to additional information, resulting in your data being compromised. The good news is, you don’t need to be an IT professional to put systems in place, download security programs or create certain habits to protect your device and, inturn, protect your information.