The scenario is depressingly familiar: A laptop computer or associated storage media, such as a disk, is stolen from an employee's home, car or office. Although the thief was probably after the
DebugScreen: mobile
{
"author": {
"name": "Joseph R Holahan",
"webUrl": "/author/profile/joseph-r-holahan/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 1,
"social": [],
"articles": [
{
"uri": "/2006/10/08/keeping-secure-information-safe/",
"title": "Keeping Secure Information Safe",
"byline": "Joseph R. Holahan",
"kicker": "",
"prettyDate": "October 08, 2006",
"timeToRead": "4 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/joseph-r-holahan/",
"name": "Joseph R. Holahan"
}
],
"kickerNode": [],
"summary": "The scenario is depressingly familiar: A laptop computer or associated storage media, such as a disk, is stolen from an employee's home, car or office. Although the thief was probably after the",
"body": null
}
]
}
}