After attending this presentation, you will be able to...
- Identify some of the security risks that affect electronic information
- Select cloud storage providers by employing vetting process
- Recognize the steps to effectively set up and control cloud storage
- Recall ways to add security to individual electronic documents as well as to storage areas that must be controlled