The Problem of Ad-Hoc Storage and Connections

Opinion: In another case of technology running ahead of security, mobile devices and wireless connections can infiltrate a network and pose threats. But software is available to manage the problem.

Further reading