A security blogger has posted an entry about the use of asset tags for computer security and other sensitive equipment. First he questions those firms that don't have asset tag procedures in use; then he explores not so good ways to use asset tags. Read his blog post at the link below:
"Asset Tags for Dummies"
September 16, 2010