Which of the following strategies, if used individually, is viewed to be the most secure method to protect data?
What is the best pre-deployment preventive action to take on a PC/laptop destined to receive Pointsec?