The five necessities from your endpoint security lover Some parts of this post are sourced from: www.itpro.co.uk