End-user Device Security

Contributed by Tom Olzak

Where does your business expend most of its resources to prevent malicious code attacks? If your company is like those for which I have worked, most of the time and effort is spent on the network perimeter and servers. But what about those ubiquitous end-user devices?

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet