With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.
|Review of a VPN cert policy||4||43|
|desktop security assessment (windows devices).||2||41|
|Scan Mac for security breach?||5||42|
|Display which user(s) is logged in to Access DB over the network||3||36|