Summary
In this chapter, you learned about the security implications of the desktop, how easy it is for company data to be stored on local disk drives of physical machines, and the implications that occur when a physical machine is lost or stolen, as well as the modern device actions that you as an IT admin can use to safeguard your company data.
In the next chapter, we will move on from desktops to the security challenges that companies currently face.