![]() ![]() ![]() This guide is aimed at information security managers / CISO, IT managers / CIO, IT security experts and their IT consultants. Use Microsoft BitLocker according to the state of the art! This is especially true if the end device is permanently in the possession of a potential attacker. However, if the end device is lost or stolen, the data stored on it must be adequately protected against unauthorized access. The protection of data on mobile devices poses a considerable challenge to responsible persons, as the data is to be used by authorized persons at all times. The basis for this guideline is the need for action in the processing and storage of personal data, as well as personal data requiring special protection, especially as soon as this data is exposed to an increased risk of loss through storage on mobile devices. Manfred Scholz, SEC4YOU Managing Director ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |