A proper security strategy includes both technical and physical security methods. In this video, you’ll learn about some common physical security techniques.
Our mobile devices are easily lost or left unattended, and we need the best possible security to protect our private information. In this video, you’ll learn about passcode locks, remote wipe functionality, remote backup, antivirus, and patching of remote devices.
An insecure network is an open door to misuse. In this video, you’ll learn ways to help secure your wired and wireless networks.
We often think of network security as bits and bytes, but a large part of technology security exists in the physical world. In this video, you’ll learn about hardware locks, tailgating, shoulder surfing, shredding, and more.
We have become a mobile workforce, and there are a number of security concerns that this mobility brings. In this video, you’ll learn about mobile device encryption, remote wiping, voice encryption, and GPS tracking.
There are a number of security techniques that transcend a single computer or operating system. In this video, you’ll learn about cable locks, safes, and locking cabinets.
You’d like to configure a computer so that it won’t start the operating system unless the correct password is provided. What’s the best way to accomplish this?