The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely.
March 24, 2006. 3- Daniel Roth with Stephanie Mehta, IDENTITY THEFT: The Great Data Heist, May 16, 2005, Fortune, and Dawn Kawamoto, Security Strategy: 185,000 people's medical data stolen, April 11, 2005, www.silicon.com . 4- ibid 5- ibid 6- Matt Caterinicchia, Laptops lost, stolen at Justice, August 12, 2002, FCW.com. COMPUTER THEFT STATISTICS Think a security breach will never happen at your organization? Think again: Laptop theft was attributed to 59 percent of computer attacks on government