Crucial Technologies is planning on donating old laptops to a local charity. What process is most import for admins to preform to protect company information from disclosure once the laptops are reused?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |