7 PRACTICAL GUIDELINES FOR INFORMATION SECURITY

When travelling on business trips around the world it is a great risk to bring computers, tablets and mobilephones.

In many countries e-services might try to take control of the gadgets via Wi-Fi, Bluetooth or by phisically break into the hardware, to then install hidden software which can make outsiders able to download all files, read all emails, control the microphone and camera of your device, and get access to the company’s data systems when you get back to the office.

Log in to the Members page to read the full article.

Delivered by: