| Line 14: | Line 14: | 
|  |  |  |  | 
|  | ==Heading 2== |  | ==Heading 2== | 
| − | By connecting via the internet to potentially classified or sensitive applications or data, there are threats to the safety and security of that information.
 |  | 
| − | 
 |  | 
| − | Security issues may include:
 |  | 
| − | *Lack of physical security - devices can be stolen, drives can be copied, or people can shoulder surf.
 |  | 
| − | *Unsecured Networks - connecting on networks that are unsecured such as cafe, hotel and other open public networks are easy targets for exploitation. 
 |  | 
| − | *Providing Internal Access Externally - servers will be facing the internet therefore increasing the potential risk and vulnerability of being compromised.
 |  | 
| − | *Out of Date Software - When using personal devices system updates and patches cannot be guaranteed.
 |  | 
|  |  |  |  | 
|  | ==Heading 3== |  | ==Heading 3== |