Tuesday, September 21, 2010

Use of Asset Tags for Computers

A security blogger has posted an entry about the use of asset tags for computer security and other sensitive equipment.  First he questions those firms that don't have asset tag procedures in use; then he explores not so good ways to use asset tags.  Read his blog post at the link below:

"Asset Tags for Dummies"
September 16, 2010

1 comment:

Unknown said...

This post is really educational. Thanks for sharing it. I respect your opinion.