How to handle a security breach

One of the most common methods to breach data that is supposed to be kept secure is the theft or loss of the physical assets containing secure data. All too often people leave portable computers, mobile devices and the like open and accessible for just about anyone. Claudiu Popa writes a simple five-step guide on what to do if and when you suspect privacy has been is breached.

Needless to say one extremely easy method to prevent privacy breaches is the use of Cicada Security Technology on all your computing devices.