{"id":1846,"date":"2006-01-27T00:00:00","date_gmt":"2006-01-27T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/27\/symantec-warns-of-notebook-dangers\/"},"modified":"2021-12-30T11:40:07","modified_gmt":"2021-12-30T11:40:07","slug":"symantec-warns-of-notebook-dangers","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/27\/symantec-warns-of-notebook-dangers\/","title":{"rendered":"Symantec warns of notebook dangers"},"content":{"rendered":"<p>Some respondents claimed that their mobile device was worth as much as \u00a35 million.   Symantect also revealed that just 42 per cent of companies automatically back up employees email on laptops, while 45 per cent actually leave backup to the users themselves.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;It&#8217;s alarming that executives have mobile devices containing data of such financial value and that very little is being done to protect the information on them.<\/p>\n<p>The research shows that only a few organisations have measures in place to retrieve this information if their laptop is lost or stolen, which is very worrying,&#8221; said Lindsey Armstrong, senior vice president EMEA at Symantec.<\/p>\n<p>http:\/\/www.macworld.co.uk\/news\/index.cfm?RSS&#038;NewsID=13702<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1846","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1846"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1846\/revisions"}],"predecessor-version":[{"id":4333,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1846\/revisions\/4333"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}