The document discusses creating armor to protect personal data and information in organizations. It talks about the risks of using mobile devices and storing sensitive data on them, as they can easily be lost, stolen, or have their wireless communications intercepted. It provides best practices for mobile data security, including not storing sensitive data on mobile devices, being wary of unknown wireless networks, and avoiding leaving portable storage devices unsecured.
Related topics: