February 2009
Beginner
427 pages
9h 47m
English

It's a tough task to prevent data leaks, losses and breaches and you have to start somewhere. Where's the best place to start? The endpoint.
This part looks at how the threats are evolving, as well as the different technologies you need to consider to protect the most troubling of endpoints — the laptop. It also looks at other common data loss threats — CD ROMs, USB devices, mobile phones and PDAs.
Finally, it examines how geography is also related to data loss and where you are most at risk.
Read now
Unlock full access