This resource is no longer available
Managing threats and securing the network inevitably means dealing with ad hoc file transfers by endusers to and from many different sources. The various means they use -- USB sticks, email, cloud drives, and other technologies -- each carry their own profile of usability and risk.
Take this short survey and get this valuable guide in how to explain the options in plain language to non-technical users. Laughter included!