Thursday, June 2, 2016
Secure and Protect your Mobile Devices
The increased use of mobile technologies; e.g.; laptops, smartphones, tablet computers, and portable storage devices, enables the processing, accessing and storage of sensitive University data outside of the physical and logical security boundaries of the University’s network. To ensure the confidentiality, integrity and availability of... More